From 79c6c4df1e23e31a142071e5293d0ce3d977c9a2 Mon Sep 17 00:00:00 2001 From: Harshvardhan Pandit Date: Fri, 16 Aug 2024 17:46:40 +0100 Subject: [PATCH] RISK: restructures risk taxonomy; costmetics - In RISK extension, the taxonomy has been restructured as per the discussion in #181 where there is a single taxonomy under `dpv:RiskConcept` as the top concept - The concept `dpv:RiskConcept` has been added to DPV, and the other corresponding risk concepts have been declared as its subclass - The consequences and impacts taxonomy has been restructured and grouped into more 'organic' categories rather than arbitrary ones - Cosmetic changes to RISK include a new empty incident report section to be filled in the future, and a better visual representation of the risk matrixes in a table --- 2.1-dev/dpv/dpv-en.html | 283 +- 2.1-dev/dpv/dpv-owl.html | 200 +- 2.1-dev/dpv/dpv-owl.jsonld | 25992 ++++++------- 2.1-dev/dpv/dpv-owl.n3 | 50 +- 2.1-dev/dpv/dpv-owl.rdf | 16816 ++++----- 2.1-dev/dpv/dpv-owl.ttl | 50 +- 2.1-dev/dpv/dpv.csv | 1724 +- 2.1-dev/dpv/dpv.html | 283 +- 2.1-dev/dpv/dpv.jsonld | 30214 ++++++++-------- 2.1-dev/dpv/dpv.n3 | 58 +- 2.1-dev/dpv/dpv.rdf | 17026 ++++----- 2.1-dev/dpv/dpv.ttl | 58 +- 2.1-dev/dpv/index-en.html | 283 +- 2.1-dev/dpv/index.html | 283 +- 2.1-dev/dpv/modules/TOM-en.html | 96 + 2.1-dev/dpv/modules/TOM-owl.html | 200 +- 2.1-dev/dpv/modules/TOM-owl.jsonld | 680 +- 2.1-dev/dpv/modules/TOM-owl.rdf | 466 +- 2.1-dev/dpv/modules/TOM.csv | 36 +- 2.1-dev/dpv/modules/TOM.html | 96 + 2.1-dev/dpv/modules/TOM.jsonld | 1138 +- 2.1-dev/dpv/modules/TOM.rdf | 354 +- 2.1-dev/dpv/modules/consent-owl.jsonld | 216 +- 2.1-dev/dpv/modules/consent-owl.rdf | 190 +- 2.1-dev/dpv/modules/consent.csv | 6 +- 2.1-dev/dpv/modules/consent.jsonld | 288 +- 2.1-dev/dpv/modules/consent.rdf | 86 +- .../dpv/modules/consent_controls-owl.jsonld | 288 +- 2.1-dev/dpv/modules/consent_controls-owl.rdf | 218 +- 2.1-dev/dpv/modules/consent_controls.csv | 12 +- 2.1-dev/dpv/modules/consent_controls.jsonld | 352 +- 2.1-dev/dpv/modules/consent_controls.rdf | 168 +- 2.1-dev/dpv/modules/consent_status-owl.jsonld | 550 +- 2.1-dev/dpv/modules/consent_status-owl.rdf | 480 +- 2.1-dev/dpv/modules/consent_status.csv | 28 +- 2.1-dev/dpv/modules/consent_status.jsonld | 794 +- 2.1-dev/dpv/modules/consent_status.rdf | 322 +- 2.1-dev/dpv/modules/consent_types-owl.jsonld | 432 +- 2.1-dev/dpv/modules/consent_types-owl.rdf | 248 +- 2.1-dev/dpv/modules/consent_types.csv | 12 +- 2.1-dev/dpv/modules/consent_types.jsonld | 384 +- 2.1-dev/dpv/modules/consent_types.rdf | 190 +- 2.1-dev/dpv/modules/context-owl.html | 200 +- 2.1-dev/dpv/modules/context-owl.jsonld | 1654 +- 2.1-dev/dpv/modules/context-owl.rdf | 878 +- 2.1-dev/dpv/modules/context.csv | 82 +- 2.1-dev/dpv/modules/context.jsonld | 1802 +- 2.1-dev/dpv/modules/context.rdf | 750 +- 2.1-dev/dpv/modules/entities-owl.html | 200 +- 2.1-dev/dpv/modules/entities-owl.jsonld | 776 +- 2.1-dev/dpv/modules/entities-owl.rdf | 506 +- 2.1-dev/dpv/modules/entities.csv | 38 +- 2.1-dev/dpv/modules/entities.jsonld | 1044 +- 2.1-dev/dpv/modules/entities.rdf | 422 +- .../dpv/modules/entities_authority-owl.jsonld | 474 +- .../dpv/modules/entities_authority-owl.rdf | 294 +- 2.1-dev/dpv/modules/entities_authority.csv | 16 +- 2.1-dev/dpv/modules/entities_authority.jsonld | 726 +- 2.1-dev/dpv/modules/entities_authority.rdf | 256 +- .../modules/entities_datasubject-owl.jsonld | 1128 +- .../dpv/modules/entities_datasubject-owl.rdf | 580 +- 2.1-dev/dpv/modules/entities_datasubject.csv | 58 +- .../dpv/modules/entities_datasubject.jsonld | 956 +- 2.1-dev/dpv/modules/entities_datasubject.rdf | 442 +- .../dpv/modules/entities_legalrole-owl.jsonld | 1258 +- 2.1-dev/dpv/modules/entities_legalrole-owl.n3 | 8 +- .../dpv/modules/entities_legalrole-owl.rdf | 662 +- .../dpv/modules/entities_legalrole-owl.ttl | 8 +- 2.1-dev/dpv/modules/entities_legalrole.csv | 46 +- 2.1-dev/dpv/modules/entities_legalrole.jsonld | 1502 +- 2.1-dev/dpv/modules/entities_legalrole.n3 | 8 +- 2.1-dev/dpv/modules/entities_legalrole.rdf | 580 +- 2.1-dev/dpv/modules/entities_legalrole.ttl | 8 +- .../modules/entities_organisation-owl.jsonld | 480 +- .../dpv/modules/entities_organisation-owl.rdf | 352 +- 2.1-dev/dpv/modules/entities_organisation.csv | 20 +- .../dpv/modules/entities_organisation.jsonld | 764 +- 2.1-dev/dpv/modules/entities_organisation.rdf | 312 +- 2.1-dev/dpv/modules/jurisdiction-owl.jsonld | 998 +- 2.1-dev/dpv/modules/jurisdiction-owl.rdf | 652 +- 2.1-dev/dpv/modules/jurisdiction.csv | 62 +- 2.1-dev/dpv/modules/jurisdiction.jsonld | 1408 +- 2.1-dev/dpv/modules/jurisdiction.rdf | 508 +- 2.1-dev/dpv/modules/legal_basis-owl.html | 200 +- 2.1-dev/dpv/modules/legal_basis-owl.jsonld | 954 +- 2.1-dev/dpv/modules/legal_basis-owl.rdf | 554 +- 2.1-dev/dpv/modules/legal_basis.csv | 50 +- 2.1-dev/dpv/modules/legal_basis.jsonld | 1080 +- 2.1-dev/dpv/modules/legal_basis.rdf | 394 +- 2.1-dev/dpv/modules/legal_measures-owl.jsonld | 520 +- 2.1-dev/dpv/modules/legal_measures-owl.rdf | 348 +- 2.1-dev/dpv/modules/legal_measures.csv | 24 +- 2.1-dev/dpv/modules/legal_measures.jsonld | 530 +- 2.1-dev/dpv/modules/legal_measures.rdf | 266 +- .../organisational_measures-owl.jsonld | 2873 +- .../modules/organisational_measures-owl.n3 | 11 + .../modules/organisational_measures-owl.rdf | 1840 +- .../modules/organisational_measures-owl.ttl | 11 + .../dpv/modules/organisational_measures.csv | 197 +- .../modules/organisational_measures.jsonld | 2878 +- .../dpv/modules/organisational_measures.n3 | 12 + .../dpv/modules/organisational_measures.rdf | 1503 +- .../dpv/modules/organisational_measures.ttl | 12 + 2.1-dev/dpv/modules/personal_data-owl.html | 200 +- 2.1-dev/dpv/modules/personal_data-owl.jsonld | 1480 +- 2.1-dev/dpv/modules/personal_data-owl.rdf | 746 +- 2.1-dev/dpv/modules/personal_data.csv | 68 +- 2.1-dev/dpv/modules/personal_data.jsonld | 1720 +- 2.1-dev/dpv/modules/personal_data.rdf | 606 +- .../dpv/modules/physical_measures-owl.jsonld | 422 +- 2.1-dev/dpv/modules/physical_measures-owl.rdf | 336 +- 2.1-dev/dpv/modules/physical_measures.csv | 24 +- 2.1-dev/dpv/modules/physical_measures.jsonld | 668 +- 2.1-dev/dpv/modules/physical_measures.rdf | 244 +- 2.1-dev/dpv/modules/process-owl.jsonld | 544 +- 2.1-dev/dpv/modules/process-owl.rdf | 328 +- 2.1-dev/dpv/modules/process.csv | 22 +- 2.1-dev/dpv/modules/process.jsonld | 776 +- 2.1-dev/dpv/modules/process.rdf | 242 +- 2.1-dev/dpv/modules/processing-owl.html | 200 +- 2.1-dev/dpv/modules/processing-owl.jsonld | 2198 +- 2.1-dev/dpv/modules/processing-owl.n3 | 16 +- 2.1-dev/dpv/modules/processing-owl.rdf | 1324 +- 2.1-dev/dpv/modules/processing-owl.ttl | 16 +- 2.1-dev/dpv/modules/processing.csv | 110 +- 2.1-dev/dpv/modules/processing.jsonld | 2280 +- 2.1-dev/dpv/modules/processing.n3 | 16 +- 2.1-dev/dpv/modules/processing.rdf | 986 +- 2.1-dev/dpv/modules/processing.ttl | 16 +- .../dpv/modules/processing_context-owl.jsonld | 3378 +- .../dpv/modules/processing_context-owl.rdf | 1848 +- 2.1-dev/dpv/modules/processing_context.csv | 182 +- 2.1-dev/dpv/modules/processing_context.jsonld | 3600 +- 2.1-dev/dpv/modules/processing_context.rdf | 1668 +- .../dpv/modules/processing_scale-owl.jsonld | 1096 +- 2.1-dev/dpv/modules/processing_scale-owl.rdf | 634 +- 2.1-dev/dpv/modules/processing_scale.csv | 64 +- 2.1-dev/dpv/modules/processing_scale.jsonld | 1296 +- 2.1-dev/dpv/modules/processing_scale.rdf | 462 +- 2.1-dev/dpv/modules/purposes-owl.html | 200 +- 2.1-dev/dpv/modules/purposes-owl.jsonld | 3058 +- 2.1-dev/dpv/modules/purposes-owl.rdf | 1926 +- 2.1-dev/dpv/modules/purposes.csv | 200 +- 2.1-dev/dpv/modules/purposes.jsonld | 3390 +- 2.1-dev/dpv/modules/purposes.rdf | 1602 +- 2.1-dev/dpv/modules/rights-owl.html | 200 +- 2.1-dev/dpv/modules/rights-owl.jsonld | 1130 +- 2.1-dev/dpv/modules/rights-owl.rdf | 584 +- 2.1-dev/dpv/modules/rights.csv | 26 +- 2.1-dev/dpv/modules/rights.jsonld | 1288 +- 2.1-dev/dpv/modules/rights.rdf | 428 +- 2.1-dev/dpv/modules/risk-en.html | 185 +- 2.1-dev/dpv/modules/risk-owl.html | 200 +- 2.1-dev/dpv/modules/risk-owl.jsonld | 1541 +- 2.1-dev/dpv/modules/risk-owl.n3 | 19 +- 2.1-dev/dpv/modules/risk-owl.rdf | 888 +- 2.1-dev/dpv/modules/risk-owl.ttl | 19 +- 2.1-dev/dpv/modules/risk.csv | 77 +- 2.1-dev/dpv/modules/risk.html | 185 +- 2.1-dev/dpv/modules/risk.jsonld | 1888 +- 2.1-dev/dpv/modules/risk.n3 | 22 +- 2.1-dev/dpv/modules/risk.rdf | 745 +- 2.1-dev/dpv/modules/risk.ttl | 22 +- 2.1-dev/dpv/modules/rules-owl.html | 200 +- 2.1-dev/dpv/modules/rules-owl.jsonld | 440 +- 2.1-dev/dpv/modules/rules-owl.rdf | 302 +- 2.1-dev/dpv/modules/rules.csv | 18 +- 2.1-dev/dpv/modules/rules.jsonld | 844 +- 2.1-dev/dpv/modules/rules.rdf | 246 +- 2.1-dev/dpv/modules/status-owl.jsonld | 2220 +- 2.1-dev/dpv/modules/status-owl.rdf | 1436 +- 2.1-dev/dpv/modules/status.csv | 160 +- 2.1-dev/dpv/modules/status.jsonld | 2442 +- 2.1-dev/dpv/modules/status.rdf | 1164 +- .../dpv/modules/technical_measures-owl.jsonld | 2236 +- .../dpv/modules/technical_measures-owl.rdf | 1606 +- 2.1-dev/dpv/modules/technical_measures.csv | 138 +- 2.1-dev/dpv/modules/technical_measures.jsonld | 2108 +- 2.1-dev/dpv/modules/technical_measures.rdf | 1282 +- 2.1-dev/risk/index-en.html | 16460 +++------ 2.1-dev/risk/index.html | 16460 +++------ 2.1-dev/risk/modules/core-owl.jsonld | 1104 +- 2.1-dev/risk/modules/core-owl.n3 | 6 +- 2.1-dev/risk/modules/core-owl.rdf | 486 +- 2.1-dev/risk/modules/core-owl.ttl | 6 +- 2.1-dev/risk/modules/core.csv | 42 +- 2.1-dev/risk/modules/core.jsonld | 1128 +- 2.1-dev/risk/modules/core.n3 | 8 +- 2.1-dev/risk/modules/core.rdf | 374 +- 2.1-dev/risk/modules/core.ttl | 8 +- 2.1-dev/risk/modules/incident-owl.jsonld | 788 +- 2.1-dev/risk/modules/incident-owl.rdf | 402 +- 2.1-dev/risk/modules/incident.csv | 44 +- 2.1-dev/risk/modules/incident.jsonld | 964 +- 2.1-dev/risk/modules/incident.rdf | 308 +- .../risk/modules/incident_status-owl.jsonld | 664 +- 2.1-dev/risk/modules/incident_status-owl.rdf | 252 +- 2.1-dev/risk/modules/incident_status.csv | 20 +- 2.1-dev/risk/modules/incident_status.jsonld | 638 +- 2.1-dev/risk/modules/incident_status.rdf | 168 +- .../risk/modules/risk_consequences-owl.jsonld | 7685 ++-- 2.1-dev/risk/modules/risk_consequences-owl.n3 | 1966 +- .../risk/modules/risk_consequences-owl.rdf | 3602 +- .../risk/modules/risk_consequences-owl.ttl | 1966 +- 2.1-dev/risk/modules/risk_consequences.csv | 281 +- 2.1-dev/risk/modules/risk_consequences.jsonld | 7870 ++-- 2.1-dev/risk/modules/risk_consequences.n3 | 2005 +- 2.1-dev/risk/modules/risk_consequences.rdf | 3295 +- 2.1-dev/risk/modules/risk_consequences.ttl | 2005 +- 2.1-dev/risk/modules/risk_controls-owl.jsonld | 816 +- 2.1-dev/risk/modules/risk_controls-owl.rdf | 486 +- 2.1-dev/risk/modules/risk_controls.csv | 56 +- 2.1-dev/risk/modules/risk_controls.jsonld | 946 +- 2.1-dev/risk/modules/risk_controls.rdf | 372 +- 2.1-dev/risk/modules/risk_levels-owl.jsonld | 1310 +- 2.1-dev/risk/modules/risk_levels-owl.rdf | 702 +- 2.1-dev/risk/modules/risk_levels.csv | 62 +- 2.1-dev/risk/modules/risk_levels.jsonld | 1228 +- 2.1-dev/risk/modules/risk_levels.rdf | 478 +- 2.1-dev/risk/modules/risk_matrix-owl.jsonld | 1744 +- 2.1-dev/risk/modules/risk_matrix-owl.rdf | 1406 +- 2.1-dev/risk/modules/risk_matrix.csv | 174 +- 2.1-dev/risk/modules/risk_matrix.jsonld | 1568 +- 2.1-dev/risk/modules/risk_matrix.rdf | 970 +- 2.1-dev/risk/risk-en.html | 16460 +++------ 2.1-dev/risk/risk-owl.html | 15123 +++----- 2.1-dev/risk/risk-owl.jsonld | 12204 +++---- 2.1-dev/risk/risk-owl.n3 | 1993 +- 2.1-dev/risk/risk-owl.rdf | 6625 ++-- 2.1-dev/risk/risk-owl.ttl | 1993 +- 2.1-dev/risk/risk.csv | 665 +- 2.1-dev/risk/risk.html | 16460 +++------ 2.1-dev/risk/risk.jsonld | 13163 +++---- 2.1-dev/risk/risk.n3 | 2056 +- 2.1-dev/risk/risk.rdf | 6370 ++-- 2.1-dev/risk/risk.ttl | 2056 +- 2.1-dev/search.html | 4 +- code/900_generate_releases.sh | 2 +- code/jinja2_resources/template_risk.jinja2 | 275 +- code/vocab_csv/Risk.csv | 4 +- code/vocab_csv/RiskConsequences.csv | 439 +- code/vocab_csv/dpv-Risk.csv | 7 +- code/vocab_csv/risk.xlsx | Bin 313205 -> 390233 bytes 243 files changed, 164504 insertions(+), 220024 deletions(-) diff --git a/2.1-dev/dpv/dpv-en.html b/2.1-dev/dpv/dpv-en.html index e87a105f4..c351d77da 100644 --- a/2.1-dev/dpv/dpv-en.html +++ b/2.1-dev/dpv/dpv-en.html @@ -3819,8 +3819,14 @@

Organisational Measures

  • dpv:ConsentRecord: A Record of Consent or Consent related activities go to full definition + +
  • dpv:DataTransferRecord: Record of data transfer activities go to full definition @@ -4535,47 +4541,10 @@

    Risk and Impact Assessment

    For more developed representations of risk assessment, mitigation, and management vocabularies, we suggest the adoption of relevant standards, such as the ISO/IEC 31000 series, and welcome contribution for their representation within DPV through [[[RISK]]].

      -
    • - dpv:Consequence: The consequence(s) possible or arising from specified context - go to full definition -
        -
      • - dpv:ConsequenceAsSideEffect: The consequence(s) possible or arising as a side-effect of specified context - go to full definition - -
      • -
      • - dpv:ConsequenceOfFailure: The consequence(s) possible or arising from failure of specified context - go to full definition - -
      • -
      • - dpv:ConsequenceOfSuccess: The consequence(s) possible or arising from success of specified context - go to full definition - -
      • -
      • - dpv:Impact: The impact(s) possible or arising as a consequence from specified context - go to full definition - -
      • -
      -
    • dpv:Likelihood: The likelihood or probability or chance of something taking place or occuring go to full definition -
    • -
    • - dpv:Risk: A risk or possibility or uncertainty of negative effects, impacts, or consequences - go to full definition -
    • dpv:RiskAssessment: Assessment involving identification, analysis, and evaluation of risk @@ -4626,6 +4595,49 @@

      Risk and Impact Assessment

      dpv:CybersecurityAssessment: Assessment of cybersecurity capabilities in terms of vulnerabilities and effectiveness of controls go to full definition +
    • +
    +
  • + + +
  • + dpv:RiskConcept: Concepts associated with Risk, Risk Source, Consequences, and Impacts + go to full definition + -
  • -
  • - risk:EconomicDisadvantage: Economic Disadvantage - go to full definition - -
  • -
  • - risk:HealthLifeImpact: Health and life impact - go to full definition - -
  • -
  • - risk:ImpactOnDataSubject: Impact on Data Subject - go to full definition - -
  • -
  • - risk:ImpactToRights: Impact to Rights - go to full definition - -
  • -
  • - risk:Misuse: Misuse - go to full definition - -
  • -
  • - risk:PrivacyImpact: Privacy impact - go to full definition - -
  • -
  • - risk:Reidentification: Re-identification - go to full definition - -
  • -
  • - risk:ReputationTrustImpact: Reputation and trust impact - go to full definition - -
  • -
  • - risk:SecurityBreach: Security Breach - go to full definition - -
  • -
  • - risk:SocialDisadvantage: Social Disadvantage - go to full definition - -
  • - - - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    - -
      -
    • - risk:RiskMatrix3x3: A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - go to full definition -
        -
      • - risk:RM3x3S1L1: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L2: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L3: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L1: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S2L2: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L3: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L1: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S3L2: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L3: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix5x5: A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - go to full definition -
        -
      • - risk:RM5x5S1L1: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L2: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L3: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L4: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S1L5: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L1: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S2L2: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L3: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L4: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L5: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L1: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S3L2: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L3: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L4: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L5: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L1: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S4L2: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S4L3: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S4L4: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L5: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L1: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S5L2: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L3: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L4: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L5: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix7x7: A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - go to full definition -
        -
      • - risk:RM7x7S1L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L1: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L2: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L3: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S2L4: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L5: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L6: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S2L7: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L1: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S3L2: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S3L3: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S3L4: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L5: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L6: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L7: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L1: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition - -
      • -
      • - risk:RM7x7S4L2: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S4L3: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S4L4: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L5: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L6: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L7: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L1: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S5L2: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S5L3: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S5L4: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S5L5: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L6: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S5L7: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L1: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S6L2: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S6L3: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S6L4: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L5: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L6: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L7: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S7L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S7L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S7L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S7L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      -
    • -
    - -
    - - -
    -

    Vocabulary Index

    -
    -

    Classes

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    Abusive Content Utilisation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAbusiveContentUtilisationPrefixrisk
    LabelAbusive Content Utilisation
    IRIhttps://w3id.org/dpv/risk#AbusiveContentUtilisation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAbusive Content Utilisation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Accidental Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Attack on Private Life

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAttackonPrivateLifePrefixrisk
    LabelAttack on Private Life
    IRIhttps://w3id.org/dpv/risk#AttackonPrivateLife
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAttack on Private Life
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Authorisation Failure

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAuthorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Availability Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Avoid Source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Benefit

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionImpact(s) that acts as or causes benefits
    Date Created2022-03-23
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Blackmail

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBlackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Brute Force Authorisations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBrute Force Authorisations
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business disruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessdisruptionPrefixrisk
    LabelBusiness disruption
    IRIhttps://w3id.org/dpv/risk#Businessdisruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness disruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessImpactPrefixrisk
    LabelBusiness impact
    IRIhttps://w3id.org/dpv/risk#BusinessImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business Performance Impairment

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessPerformanceImpairmentPrefixrisk
    LabelBusiness Performance Impairment
    IRIhttps://w3id.org/dpv/risk#BusinessPerformanceImpairment
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness Performance Impairment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - - - -
    -

    Change Consequence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Change Impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Child Violence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChildViolencePrefixrisk
    LabelChild Violence
    IRIhttps://w3id.org/dpv/risk#ChildViolence
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionChild Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Citizens impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCitizensImpactPrefixrisk
    LabelCitizens impact
    IRIhttps://w3id.org/dpv/risk#CitizensImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCitizens impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Coercion

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCoercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compensation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types risk:Benefit - → dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionCompensation provided (as an impact)
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compliance impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermComplianceImpactPrefixrisk
    LabelCompliance impact
    IRIhttps://w3id.org/dpv/risk#ComplianceImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompliance impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Credentials

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Credentials
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountSecurityPrefixrisk
    LabelCompromise Account Security
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Security
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Confidentiality Breach

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConfidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Confidentiality Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Consequence Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Consequence for Data Subject

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceForDataSubjectPrefixrisk
    LabelConsequence for Data Subject
    IRIhttps://w3id.org/dpv/risk#ConsequenceForDataSubject
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence for Data Subject
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Consequence on Data Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceOnDataSecurityPrefixrisk
    LabelConsequence on Data Security
    IRIhttps://w3id.org/dpv/risk#ConsequenceOnDataSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence on Data Security
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Containment Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Copyright Violation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCopyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - -
    -

    Corruption of Data

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCorruptionDataPrefixrisk
    LabelCorruption of Data
    IRIhttps://w3id.org/dpv/risk#CorruptionData
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCorruption of Data
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Acquisition

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostAcquisitionPrefixrisk
    LabelCost of Acquisition
    IRIhttps://w3id.org/dpv/risk#CostAcquisition
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Acquisition
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Backup

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostBackupPrefixrisk
    LabelCost of Backup
    IRIhttps://w3id.org/dpv/risk#CostBackup
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Backup
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Configuration

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostConfigurationPrefixrisk
    LabelCost of Configuration
    IRIhttps://w3id.org/dpv/risk#CostConfiguration
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Configuration
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Installation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostInstallationPrefixrisk
    LabelCost of Installation
    IRIhttps://w3id.org/dpv/risk#CostInstallation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Installation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Penalties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialPenaltiesPrefixrisk
    LabelCost of Judicial Penalties
    IRIhttps://w3id.org/dpv/risk#CostJudicialPenalties
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Penalties
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Proceedings

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialProceedingsPrefixrisk
    LabelCost of Judicial Proceedings
    IRIhttps://w3id.org/dpv/risk#CostJudicialProceedings
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Proceedings
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Operation Interruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostOperationInterruptionPrefixrisk
    LabelCost of Operation Interruption
    IRIhttps://w3id.org/dpv/risk#CostOperationInterruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Operation Interruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Suspended Operations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostSuspendedOperationsPrefixrisk
    LabelCost of Suspended Operations
    IRIhttps://w3id.org/dpv/risk#CostSuspendedOperations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Suspended Operations
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Cross-Border Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Cryptojacking

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCryptojackingPrefixrisk
    LabelCryptojacking
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Spying

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCyberSpyingPrefixrisk
    LabelCyber Spying
    IRIhttps://w3id.org/dpv/risk#CyberSpying
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCyber Spying
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Stalking

    + + + + + +
    +

    3 Likelihood Levels

    - + - + - + - + - - - - - + - @@ -7109,23 +2178,20 @@

    Cyber Stalking

    - + - - - - + - + @@ -7136,7 +2202,7 @@

    Cyber Stalking

    - @@ -7145,51 +2211,41 @@

    Cyber Stalking

    -
    -

    Damage

    +
    +

    3 Risk Levels

    TermCyberStalking3LikelihoodLevels Prefix risk
    LabelCyber Stalking3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#CyberStalkinghttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionCyber StalkingScale with 3 Likelihood Levels from High to Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7200,7 +2256,7 @@

    Damage

    - + @@ -7213,7 +2269,7 @@

    Damage

    - + @@ -7224,7 +2280,7 @@

    Damage

    - @@ -7233,52 +2289,41 @@

    Damage

    -
    -

    Damage by Third Party

    +
    +

    3 Severity Levels

    TermDamage3RiskLevels Prefix risk
    LabelDamage3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes damagesScale with 3 Risk Levels from High to Low
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7289,23 +2334,20 @@

    Damage by Third Party

    - + - - - - + - + @@ -7316,7 +2358,7 @@

    Damage by Third Party

    - @@ -7325,53 +2367,41 @@

    Damage by Third Party

    -
    -

    Danger to Customers

    +
    +

    5 Likelihood Levels

    TermDamageByThirdParty3SeverityLevels Prefix risk
    LabelDamage by Third Party3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DamageByThirdPartyhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionDamage by Third PartyScale with 3 Severity Levels from High to Low
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7382,23 +2412,20 @@

    Danger to Customers

    - + - - - - + - + @@ -7409,7 +2436,7 @@

    Danger to Customers

    - @@ -7418,53 +2445,41 @@

    Danger to Customers

    -
    -

    Danger to Personnel

    +
    +

    5 Risk Levels

    TermDangertoCustomers5LikelihoodLevels Prefix risk
    LabelDanger to Customers5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DangertoCustomershttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionDanger to CustomersScale with 5 Likelihood Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7475,23 +2490,20 @@

    Danger to Personnel

    - + - - - - + - + @@ -7502,7 +2514,7 @@

    Danger to Personnel

    - @@ -7511,52 +2523,41 @@

    Danger to Personnel

    -
    -

    Data Breach

    +
    +

    5 Severity Levels

    TermDangertoPersonnel5RiskLevels Prefix risk
    LabelDanger to Personnel5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DangertoPersonnelhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDanger to PersonnelScale with 5 Risk Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7567,26 +2568,20 @@

    Data Breach

    - + - - - - - - - + - + @@ -7597,7 +2592,7 @@

    Data Breach

    - @@ -7605,41 +2600,42 @@

    Data Breach

    -
    -

    Deliberate Incident

    + +
    +

    7 Likelihood Levels

    TermDataBreach5SeverityLevels Prefix risk
    LabelData Breach5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionData BreachScale with 5 Severity Levels from Very High to Very Low
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7650,7 +2646,7 @@

    Deliberate Incident

    - + @@ -7663,15 +2659,18 @@

    Deliberate Incident

    - + - + + + + - @@ -7680,52 +2679,41 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    7 Risk Levels

    TermDeliberateIncident7LikelihoodLevels Prefix risk
    LabelDeliberate Incident7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident + dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to deliberate actions of a humanScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7736,23 +2724,20 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + @@ -7763,7 +2748,7 @@

    Denial of Service Attack (DoS)

    - @@ -7772,45 +2757,41 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    +
    +

    7 Severity Levels

    TermDenialServiceAttack7RiskLevels Prefix risk
    LabelDenial of Service Attack (DoS)7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDenial of Service Attack (DoS)Scale with 7 Risk Levels from Extremely High to Extremely Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7821,7 +2802,7 @@

    Detection Control

    - + @@ -7834,15 +2815,18 @@

    Detection Control

    - + - + + + + - @@ -7850,52 +2834,42 @@

    Detection Control

    - -
    -

    Detriment

    +
    +

    Accidental Incident

    TermDetectionControl7SeverityLevels Prefix risk
    LabelDetection Control7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to detect eventScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7906,7 +2880,7 @@

    Detriment

    - + @@ -7919,18 +2893,15 @@

    Detriment

    - + - - - - + - @@ -7939,54 +2910,40 @@

    Detriment

    -
    -

    Detriment to Recovery

    +
    +

    Accidental Misuse

    TermDetrimentAccidentalIncident Prefix risk
    LabelDetrimentAccidental Incident
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes detrimentsIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2022-03-232024-05-19
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -7995,29 +2952,20 @@

    Detriment to Recovery

    - + - - - - + - - - - + - - - - + @@ -8031,55 +2979,40 @@

    Detriment to Recovery

    -
    -

    Discrimination

    +
    +

    Authorisation Failure

    TermDetrimentToRecoveryAccidentalMisuse Prefix risk
    LabelDetriment to RecoveryAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#DetrimentToRecoveryhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDetriment to RecoveryAccidental Misuse
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8088,25 +3021,31 @@

    Discrimination

    - + - + + + + - + - + + + + - + @@ -8121,85 +3060,61 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    None

    TermDiscriminationAuthorisationFailure Prefix risk
    LabelDiscriminationAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDiscriminationSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -8212,54 +3127,42 @@

    Distributed Denial of Service Attack (DDoS)

    - -
    -

    Eavesdropping

    +
    +

    Availability Incident

    TermDistributedDenialServiceAttackAvailabilityBreach Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)None
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDistributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8270,34 +3173,28 @@

    Eavesdropping

    - + - - - - + - + - - - - + - @@ -8306,51 +3203,46 @@

    Eavesdropping

    -
    -

    Economic Disadvantage

    +
    +

    Avoid Source

    TermEavesdroppingAvailabilityIncident Prefix risk
    LabelEavesdroppingAvailability Incident
    IRIhttps://w3id.org/dpv/risk#Eavesdroppinghttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionEavesdroppingIncident where the availability of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -8361,7 +3253,7 @@

    Economic Disadvantage

    - + @@ -8374,18 +3266,18 @@

    Economic Disadvantage

    - + - + - @@ -8393,43 +3285,41 @@

    Economic Disadvantage

    -
    -

    Environmental Incident

    + +
    +

    Benefit

    TermEconomicDisadvantageAvoidSource Prefix risk
    LabelEconomic DisadvantageAvoid Source
    IRIhttps://w3id.org/dpv/risk#EconomicDisadvantagehttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEconomic DisadvantageControl that avoids the risk source
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -8438,7 +3328,7 @@

    Environmental Incident

    - + @@ -8451,15 +3341,21 @@

    Environmental Incident

    - + - - + + + + + + + + - @@ -8468,55 +3364,40 @@

    Environmental Incident

    -
    -

    Environmental Safety Endangerment

    +
    +

    Blackmail

    TermEnvironmentalIncidentBenefit Prefix risk
    LabelEnvironmental IncidentBenefit
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Incident + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to environmental factors outside human controlsSomething that acts as or causes benefits
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8525,7 +3406,7 @@

    Environmental Safety Endangerment

    - + @@ -8543,7 +3424,10 @@

    Environmental Safety Endangerment

    - + + + + @@ -8561,54 +3445,40 @@

    Environmental Safety Endangerment

    -
    -

    Equipment Failure

    +
    +

    Brute Force Authorisations

    TermEnvironmentalSafetyEndangermentBlackmail Prefix risk
    LabelEnvironmental Safety EndangermentBlackmail
    IRIhttps://w3id.org/dpv/risk#EnvironmentalSafetyEndangermenthttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEnvironmental Safety EndangermentSomething that acts as or causes Blackmail
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8617,7 +3487,7 @@

    Equipment Failure

    - + @@ -8626,7 +3496,7 @@

    Equipment Failure

    - + @@ -8635,7 +3505,10 @@

    Equipment Failure

    - + + + + @@ -8653,52 +3526,50 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    + + + + +
    +

    Change Consequence

    TermEquipmentFailureBruteForceAuthorisations Prefix risk
    LabelEquipment FailureBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEquipment FailureSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8709,23 +3580,20 @@

    Equipment Malfunction

    - + - - - - + - + @@ -8736,7 +3604,7 @@

    Equipment Malfunction

    - @@ -8745,52 +3613,46 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Change Impact

    TermEquipmentMalfunctionChangeConsequence Prefix risk
    LabelEquipment MalfunctionChange Consequence
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEquipment MalfunctionControl that changes Consequence
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -8801,23 +3663,20 @@

    Erroneous System Use

    - + - - - - + - + @@ -8828,7 +3687,7 @@

    Erroneous System Use

    - @@ -8837,57 +3696,40 @@

    Erroneous System Use

    - - -
    -

    Extorsion

    +
    +

    Coercion

    TermErroneousSystemUseChangeImpact Prefix risk
    LabelErroneous System UseChange Impact
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionErroneous System UseControl that changes Impact
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8896,7 +3738,7 @@

    Extorsion

    - + @@ -8914,7 +3756,10 @@

    Extorsion

    - + + + + @@ -8932,44 +3777,40 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Compensation

    TermExtorsionCoercion Prefix risk
    LabelExtorsionCoercion
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionExtorsionSomething that acts as or causes Coercion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8978,12 +3819,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -8994,18 +3832,21 @@

    Extremely High Likelihood

    - + - + + + + - + - @@ -9014,44 +3855,40 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    +
    +

    Component Failure

    TermExtremelyHighLikelihoodCompensation Prefix risk
    LabelExtremely High LikelihoodCompensation
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely HighSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9060,11 +3897,11 @@

    Extremely High Risk

    - + - + @@ -9074,20 +3911,14 @@

    Extremely High Risk

    - - - - + - - - - + - @@ -9096,44 +3927,40 @@

    Extremely High Risk

    -
    -

    Extremely High Severity

    +
    +

    Component Malfunction

    TermExtremelyHighRiskComponentFailure Prefix risk
    LabelExtremely High RiskComponent Failure
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Component Failure
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + @@ -9142,11 +3969,11 @@

    Extremely High Severity

    - + - + @@ -9156,20 +3983,14 @@

    Extremely High Severity

    - - - - + - - - - + - @@ -9178,44 +3999,40 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Compromise Account

    TermExtremelyHighSeverityComponentMalfunction Prefix risk
    LabelExtremely High SeverityComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Component Malfunction
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9224,25 +4041,28 @@

    Extremely Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -9251,7 +4071,7 @@

    Extremely Low Likelihood

    - @@ -9260,44 +4080,40 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Compromise Account Credentials

    TermExtremelyLowLikelihoodCompromiseAccount Prefix risk
    LabelExtremely Low LikelihoodCompromise Account
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowSomething that acts as or causes a compromised account that is then used by the compromiser
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9306,25 +4122,28 @@

    Extremely Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -9333,7 +4152,7 @@

    Extremely Low Risk

    - @@ -9342,44 +4161,42 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    +
    +

    Confidentiality Breach

    TermExtremelyLowRiskCompromiseAccountCredentials Prefix risk
    LabelExtremely Low RiskCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowSomething that acts as or causes Account Credentials to be compromised
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9388,25 +4205,28 @@

    Extremely Low Severity

    - + - - - - + - + + + + - + - + + + + @@ -9415,7 +4235,7 @@

    Extremely Low Severity

    - @@ -9423,50 +4243,42 @@

    Extremely Low Severity

    - -
    -

    Fee

    +
    +

    Confidentiality Incident

    TermExtremelyLowSeverityConfidentialityBreach Prefix risk
    LabelExtremely Low SeverityConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Confidentiality Breach
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -9477,34 +4289,28 @@

    Fee

    - + - - - - + - + - - - - + - @@ -9513,52 +4319,45 @@

    Fee

    -
    -

    Financial Equipment Costs

    +
    +

    Consequence Control

    TermFeeConfidentialityIncident Prefix risk
    LabelFeeConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + risk:hasIncident
    DefinitionFee provided as compensation (as an impact)Incident where the confidentiality of information or system has been affected
    Source
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -9569,23 +4368,20 @@

    Financial Equipment Costs

    - + - - - - + - + @@ -9596,7 +4392,7 @@

    Financial Equipment Costs

    - @@ -9605,52 +4401,45 @@

    Financial Equipment Costs

    -
    -

    Financial Investigation Costs

    +
    +

    Containment Control

    TermFinancialEquipmentCostsConsequenceControl Prefix risk
    LabelFinancial Equipment CostsConsequence Control
    IRIhttps://w3id.org/dpv/risk#FinancialEquipmentCostshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Equipment CostsRisk Mitigation Measure that controls the Consequences
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -9661,34 +4450,28 @@

    Financial Investigation Costs

    - + - - - - + - + - - - - + - @@ -9697,54 +4480,40 @@

    Financial Investigation Costs

    -
    -

    Financial Loss

    +
    +

    Copyright Violation

    TermFinancialInvestigationCostsContainmentControl Prefix risk
    LabelFinancial Investigation CostsContainment Control
    IRIhttps://w3id.org/dpv/risk#FinancialInvestigationCostshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Investigation CostsControl to contain event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9753,7 +4522,7 @@

    Financial Loss

    - + @@ -9762,7 +4531,7 @@

    Financial Loss

    - + @@ -9771,7 +4540,10 @@

    Financial Loss

    - + + + + @@ -9786,55 +4558,46 @@

    Financial Loss

    TermFinancialLossCopyrightViolation Prefix risk
    LabelFinancial LossCopyright Violation
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial LossSomething that acts as or causes Copyright Violation
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    + + - -
    -

    Financial Personnel Costs

    +
    +

    Cross-Border Incident

    - + - + - + - + - - - - - + - @@ -9845,34 +4608,28 @@

    Financial Personnel Costs

    - + - - - - + - + - - - - + - @@ -9881,54 +4638,40 @@

    Financial Personnel Costs

    -
    -

    Financial Repair Costs

    +
    +

    Cryptojacking

    TermFinancialPersonnelCostsCrossBorderIncident Prefix risk
    LabelFinancial Personnel CostsCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#FinancialPersonnelCostshttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionFinancial Personnel CostsIncident involving cross-border or multiple jurisdictions
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9937,7 +4680,7 @@

    Financial Repair Costs

    - + @@ -9946,7 +4689,7 @@

    Financial Repair Costs

    - + @@ -9955,7 +4698,10 @@

    Financial Repair Costs

    - + + + + @@ -9973,55 +4719,40 @@

    Financial Repair Costs

    -
    -

    Fraud

    +
    +

    Damage

    TermFinancialRepairCostsCryptojacking Prefix risk
    LabelFinancial Repair CostsCryptojacking
    IRIhttps://w3id.org/dpv/risk#FinancialRepairCostshttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial Repair CostsSomething that acts as or causes Cryptojacking
    SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10030,25 +4761,25 @@

    Fraud

    - + - - - - + - + - + + + + @@ -10066,54 +4797,41 @@

    Fraud

    -
    -

    Government Crisis

    +
    +

    Data Breach

    TermFraudDamage Prefix risk
    LabelFraudDamage
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFraudSomething that acts as or causes Damage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10122,10 +4840,13 @@

    Government Crisis

    - + + + + @@ -10140,7 +4861,10 @@

    Government Crisis

    - + + + + @@ -10149,7 +4873,7 @@

    Government Crisis

    - @@ -10158,48 +4882,40 @@

    Government Crisis

    -
    -

    Halt Source

    +
    +

    Data Corruption

    TermGovernmentCrisisDataBreach Prefix risk
    LabelGovernment CrisisData Breach
    IRIhttps://w3id.org/dpv/risk#GovernmentCrisishttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionGovernment CrisisSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
    - + - + - + - + - - - - - + @@ -10208,22 +4924,31 @@

    Halt Source

    - + - + + + + - + + + + - + - + + + + @@ -10232,7 +4957,7 @@

    Halt Source

    - @@ -10240,53 +4965,42 @@

    Halt Source

    - -
    -

    Harm

    +
    +

    Deliberate Incident

    TermHaltSourceDataCorruption Prefix risk
    LabelHalt SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10297,7 +5011,7 @@

    Harm

    - + @@ -10310,18 +5024,15 @@

    Harm

    - + - - - - + - @@ -10330,55 +5041,40 @@

    Harm

    -
    -

    Harmful Speech

    +
    +

    Denial of Service Attack (DoS)

    TermHarmDeliberateIncident Prefix risk
    LabelHarmDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes harmsIncident caused due to deliberate actions of a human
    Date Created2022-08-132024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -10387,7 +5083,7 @@

    Harmful Speech

    - + @@ -10396,7 +5092,7 @@

    Harmful Speech

    - + @@ -10405,7 +5101,10 @@

    Harmful Speech

    - + + + + @@ -10423,61 +5122,45 @@

    Harmful Speech

    - - - - - - - - - - -
    -

    Health and life impact

    +
    +

    Detection Control

    TermHarmfulSpeechDenialServiceAttack Prefix risk
    LabelHarmful SpeechDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#HarmfulSpeechhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionHarmful SpeechSomething that acts as or causes Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -10488,34 +5171,28 @@

    Health and life impact

    - + - - - - + - + - - - - + - @@ -10524,52 +5201,40 @@

    Health and life impact

    -
    -

    High Likelihood

    +
    +

    Detriment

    TermHealthLifeImpactDetectionControl Prefix risk
    LabelHealth and life impactDetection Control
    IRIhttps://w3id.org/dpv/risk#HealthLifeImpacthttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionHealth and life impactControl to detect event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -10578,12 +5243,9 @@

    High Likelihood

    - + - - - - + @@ -10594,18 +5256,21 @@

    High Likelihood

    - + - + + + + - + - @@ -10614,52 +5279,40 @@

    High Likelihood

    -
    -

    High Risk

    +
    +

    Discrimination

    TermHighLikelihoodDetriment Prefix risk
    LabelHigh LikelihoodDetriment
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is HighSomething that acts as or causes Detriment
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10668,12 +5321,9 @@

    High Risk

    - + - - - - + @@ -10684,18 +5334,21 @@

    High Risk

    - + - + + + + - + - @@ -10704,52 +5357,40 @@

    High Risk

    -
    -

    High Severity

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermHighRiskDiscrimination Prefix risk
    LabelHigh RiskDiscrimination
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighSomething that acts as or causes Discrimination
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10758,25 +5399,28 @@

    High Severity

    - + - - - - + - + + + + - + - + + + + @@ -10785,7 +5429,7 @@

    High Severity

    - @@ -10793,53 +5437,42 @@

    High Severity

    - -
    -

    Human Errors

    +
    +

    Environmental Incident

    TermHighSeverityDistributedDenialServiceAttack Prefix risk
    LabelHigh SeverityDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is HighSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10850,34 +5483,28 @@

    Human Errors

    - + - - - - + - + - - - - + - @@ -10886,47 +5513,39 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Environmental Risk

    TermHumanErrorsEnvironmentalIncident Prefix risk
    LabelHuman ErrorsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionHuman ErrorsIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -10935,7 +5554,7 @@

    Identification Control

    - + @@ -10946,17 +5565,14 @@

    Identification Control

    - - - - + - @@ -10965,54 +5581,40 @@

    Identification Control

    -
    -

    Identity Dispute

    +
    +

    Equipment Failure

    TermIdentificationControlEnvironmentalRisk Prefix risk
    LabelIdentification ControlEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11021,22 +5623,31 @@

    Identity Dispute

    - + - + + + + - + + + + - + - + + + + @@ -11054,55 +5665,40 @@

    Identity Dispute

    -
    -

    Identity Fraud

    +
    +

    Equipment Malfunction

    TermIdentityDisputeEquipmentFailure Prefix risk
    LabelIdentity DisputeEquipment Failure
    IRIhttps://w3id.org/dpv/risk#IdentityDisputehttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity DisputeSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-242022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11111,16 +5707,19 @@

    Identity Fraud

    - + - + + + + - + @@ -11129,7 +5728,10 @@

    Identity Fraud

    - + + + + @@ -11147,55 +5749,40 @@

    Identity Fraud

    -
    -

    Identity Theft

    +
    +

    Erroneous System Use

    TermIdentityFraudEquipmentMalfunction Prefix risk
    LabelIdentity FraudEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity FraudSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11204,7 +5791,7 @@

    Identity Theft

    - + @@ -11213,7 +5800,7 @@

    Identity Theft

    - + @@ -11222,7 +5809,10 @@

    Identity Theft

    - + + + + @@ -11240,54 +5830,42 @@

    Identity Theft

    -
    -

    Illegal Processing of Data

    + + +
    +

    Exposure to Harmful Speech

    TermIdentityTheftErroneousSystemUse Prefix risk
    LabelIdentity TheftErroneous System Use
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity TheftSomething that acts as or causes Erroneous System Use
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11296,16 +5874,19 @@

    Illegal Processing of Data

    - + - + + + + - + @@ -11314,7 +5895,10 @@

    Illegal Processing of Data

    - + + + + @@ -11332,47 +5916,39 @@

    Illegal Processing of Data

    -
    -

    Impact Control

    +
    +

    External Security Threat

    TermIllegalProcessingDataExposureToHarmfulSpeech Prefix risk
    LabelIllegal Processing of DataExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#IllegalProcessingDatahttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIllegal Processing of DataSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -11381,7 +5957,7 @@

    Impact Control

    - + @@ -11392,20 +5968,14 @@

    Impact Control

    - - - - + - - - - + - @@ -11414,53 +5984,40 @@

    Impact Control

    -
    -

    Impact on Data Subject

    +
    +

    Extorsion

    TermImpactControlExternalSecurityThreat Prefix risk
    LabelImpact ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11469,25 +6026,31 @@

    Impact on Data Subject

    - + - + + + + - + - + + + + - + @@ -11502,51 +6065,42 @@

    Impact on Data Subject

    -
    -

    Impact to Rights

    +
    +

    Extremely High Likelihood

    TermImpactOnDataSubjectExtorsion Prefix risk
    LabelImpact on Data SubjectExtorsion
    IRIhttps://w3id.org/dpv/risk#ImpactOnDataSubjecthttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact on Data SubjectSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-10-222022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Georg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -11557,23 +6111,23 @@

    Impact to Rights

    - + - + + + + - - - - + - + @@ -11584,7 +6138,7 @@

    Impact to Rights

    - @@ -11592,38 +6146,43 @@

    Impact to Rights

    -
    -

    Incident

    + +
    +

    Extremely High Risk

    TermImpactToRightsExtremelyHighLikelihood Prefix risk
    LabelImpact to RightsExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#ImpactToRightshttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Risk + risk:7LikelihoodLevels + → dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionImpact to RightsLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + - @@ -11634,16 +6193,13 @@

    Incident

    - + - + - - - @@ -11653,68 +6209,62 @@

    Incident

    - + - + -
    TermIncidentExtremelyHighRisk Prefix risk
    LabelIncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionAn actual or occured eventLevel where Risk is Extremely High
    Usage NoteIncident is realised or materialised riskThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-05-192022-08-18
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-LEVELS in RISK
    - - -
    -

    Incident Assessment Report

    + +
    +

    Extremely High Severity

    - + - + - + - + - - @@ -11725,9 +6275,12 @@

    Incident Assessment Report

    - + - + + + + @@ -11738,15 +6291,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -11755,44 +6311,42 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Extremely Low Likelihood

    TermIncidentAssessmentReportExtremelyHighSeverity Prefix risk
    LabelIncident Assessment ReportExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11803,9 +6357,12 @@

    Incident Concluded

    - + - + + + + @@ -11816,7 +6373,7 @@

    Incident Concluded

    - + @@ -11827,7 +6384,7 @@

    Incident Concluded

    - @@ -11835,46 +6392,43 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Extremely Low Risk

    TermIncidentConcludedExtremelyLowLikelihood Prefix risk
    LabelIncident ConcludedExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11885,9 +6439,12 @@

    Incident Concluding Report

    - + - + + + + @@ -11898,15 +6455,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -11914,46 +6474,43 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + +
    +

    Extremely Low Severity

    TermIncidentConcludingReportExtremelyLowRisk Prefix risk
    LabelIncident Concluding ReportExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11964,9 +6521,12 @@

    Incident Detection Report

    - + - + + + + @@ -11977,15 +6537,18 @@

    Incident Detection Report

    - + - + + + + - @@ -11994,46 +6557,40 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Fee

    TermIncidentDetectionReportExtremelyLowSeverity Prefix risk
    LabelIncident Detection ReportExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the detection of a IncidentLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12042,31 +6599,37 @@

    Incident Halted

    - + - + + + + - + - + + + + - + - @@ -12074,48 +6637,40 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Financial Impact

    TermIncidentHaltedFee Prefix risk
    LabelIncident HaltedFee
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#Fee
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or provides fees e.g. for using a service
    Source
    Date Created2024-02-142024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12124,7 +6679,7 @@

    Incident Handling Report

    - + @@ -12135,17 +6690,14 @@

    Incident Handling Report

    - - - - + - @@ -12153,33 +6705,38 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Financial Loss

    TermIncidentHandlingReportFinancialImpact Prefix risk
    LabelIncident Handling ReportFinancial Impact
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceThings that cause or have the potential to impact financial resources
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -12191,28 +6748,37 @@

    Incident Identifier

    - + - + + + + - + - - + + + + + + + + - @@ -12220,51 +6786,41 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Fraud

    TermIncidentIdentifierFinancialLoss Prefix risk
    LabelIncident IdentifierFinancial Loss
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incidentSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12273,22 +6829,28 @@

    Incident Impact Assessment

    - + - + + + + - + - + + + + @@ -12297,7 +6859,7 @@

    Incident Impact Assessment

    - @@ -12306,44 +6868,46 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    +
    +

    Halt Source

    TermIncidentImpactAssessmentFraud Prefix risk
    LabelIncident Impact AssessmentFraud
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentSomething that acts as or causes Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12354,7 +6918,7 @@

    Incident Mitigated

    - + @@ -12367,7 +6931,7 @@

    Incident Mitigated

    - + @@ -12378,7 +6942,7 @@

    Incident Mitigated

    - @@ -12386,45 +6950,40 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + +
    +

    Harm

    TermIncidentMitigatedHaltSource Prefix risk
    LabelIncident MitigatedHalt Source
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringControl that halts the risk source or prevents it from materialising
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12433,9 +6992,12 @@

    Incident Mitigation Measure

    - + - + + + + @@ -12446,15 +7008,21 @@

    Incident Mitigation Measure

    - + - - + + + + + + + + - @@ -12463,44 +7031,60 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + + + + + + +
    +

    High Likelihood

    TermIncidentMitigationMeasureHarm Prefix risk
    LabelIncident Mitigation MeasureHarm
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2024-05-192022-08-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -12511,9 +7095,12 @@

    Incident Near Miss

    - + - + + + + @@ -12524,7 +7111,7 @@

    Incident Near Miss

    - + @@ -12535,7 +7122,7 @@

    Incident Near Miss

    - @@ -12543,45 +7130,51 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + +
    +

    High Risk

    TermIncidentNearMissHighLikelihood Prefix risk
    LabelIncident Near MissHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Level where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12592,9 +7185,12 @@

    Incident Notice

    - + - + + + + @@ -12605,15 +7201,18 @@

    Incident Notice

    - + - + + + + - @@ -12622,44 +7221,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    +
    +

    High Severity

    TermIncidentNoticeHighRisk Prefix risk
    LabelIncident NoticeHigh Risk
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionNotice associated with an IncidentLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12670,9 +7275,12 @@

    Incident Ongoing

    - + - + + + + @@ -12683,7 +7291,7 @@

    Incident Ongoing

    - + @@ -12694,7 +7302,7 @@

    Incident Ongoing

    - @@ -12702,48 +7310,41 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + +
    +

    Human Errors

    TermIncidentOngoingHighSeverity Prefix risk
    LabelIncident OngoingHigh Severity
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionThe incident is ongoing i.e. still activeLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12752,28 +7353,37 @@

    Incident Ongoing Report

    - + - + + + + - + - - + + + + + + + + - @@ -12781,46 +7391,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + +
    +

    Identification Control

    TermIncidentOngoingReportHumanErrors Prefix risk
    LabelIncident Ongoing ReportHuman Errors
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12831,7 +7441,7 @@

    Incident Preliminary Report

    - + @@ -12852,7 +7462,7 @@

    Incident Preliminary Report

    - @@ -12860,47 +7470,41 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Identity Fraud

    TermIncidentPreliminaryReportIdentificationControl Prefix risk
    LabelIncident Preliminary ReportIdentification Control
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12909,22 +7513,28 @@

    Incident Register

    - + - + + + + - + - + + + + @@ -12933,7 +7543,7 @@

    Incident Register

    - @@ -12941,47 +7551,41 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Identity Theft

    TermIncidentRegisterIdentityFraud Prefix risk
    LabelIncident RegisterIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + + @@ -12990,28 +7594,37 @@

    Incident Report

    - + - + + + + - + - - + + + + + + + + - @@ -13019,45 +7632,41 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Illegal Data Processing

    TermIncidentReportIdentityTheft Prefix risk
    LabelIncident ReportIdentity Theft
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -13066,25 +7675,31 @@

    Incident Status

    - + + + + + - - - - - + + + + - + - + + + + @@ -13093,7 +7708,7 @@

    Incident Status

    - @@ -13102,44 +7717,45 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Impact Control

    TermIncidentStatusIllegalDataProcessing Prefix risk
    LabelIncident StatusIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Status - → dpv:Context + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -13150,7 +7766,7 @@

    Incident Status Unknown

    - + @@ -13163,7 +7779,7 @@

    Incident Status Unknown

    - + @@ -13174,7 +7790,7 @@

    Incident Status Unknown

    - @@ -13182,45 +7798,41 @@

    Incident Status Unknown

    - -
    -

    Incident Suspected

    +
    +

    Incident

    TermIncidentStatusUnknownImpactControl Prefix risk
    LabelIncident Status UnknownImpact Control
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownRisk Mitigation Measure that controls Impacts
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -13231,10 +7843,16 @@

    Incident Suspected

    - + + + + + - + + + @@ -13246,40 +7864,46 @@

    Incident Suspected

    - + + + + - + -
    TermIncidentSuspectedIncident Prefix risk
    LabelIncident SuspectedIncident
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section INCIDENT-STATUS in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + -
    -

    Incident Suspected Report

    +
    +

    Incident Assessment Report

    - + - + - + @@ -13313,7 +7937,7 @@

    Incident Suspected Report

    - + @@ -13343,23 +7967,23 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Incident Concluded

    TermIncidentSuspectedReportIncidentAssessmentReport Prefix risk
    LabelIncident Suspected ReportIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#IncidentAssessmentReport
    DefinitionA report describing the suspicion of an incident in the past or occuringA report describing the assessment of an incident in terms of its effects or impacts
    - + - + - + @@ -13391,7 +8015,7 @@

    Incident Terminated

    - + @@ -13423,53 +8047,46 @@

    Incident Terminated

    - -
    -

    Increase Internal Cost

    +
    +

    Incident Concluding Report

    TermIncidentTerminatedIncidentConcluded Prefix risk
    LabelIncident TerminatedIncident Concluded
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#IncidentConcluded
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + - @@ -13480,34 +8097,28 @@

    Increase Internal Cost

    - + - - - - + - + - - - - + - @@ -13515,53 +8126,46 @@

    Increase Internal Cost

    - -
    -

    Industrial Crisis

    +
    +

    Incident Detection Report

    TermIncreaseInternalCostIncidentConcludingReport Prefix risk
    LabelIncrease Internal CostIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#IncreaseInternalCosthttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncrease Internal CostA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13572,34 +8176,28 @@

    Industrial Crisis

    - + - - - - + - + - - - - + - @@ -13608,53 +8206,44 @@

    Industrial Crisis

    -
    -

    Injury

    +
    +

    Incident Halted

    TermIndustrialCrisisIncidentDetectionReport Prefix risk
    LabelIndustrial CrisisIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#IndustrialCrisishttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIndustrial CrisisA report describing the detection of a Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13665,23 +8254,20 @@

    Injury

    - + - - - - + - + @@ -13692,7 +8278,7 @@

    Injury

    - @@ -13700,23 +8286,23 @@

    Injury

    -
    -

    Integrity Incident

    +
    +

    Incident Handling Report

    TermInjuryIncidentHalted Prefix risk
    LabelInjuryIncident Halted
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionInjuryThe incident has halted or paused with a high likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13728,13 +8314,18 @@

    Integrity Incident

    - - @@ -13745,7 +8336,7 @@

    Integrity Incident

    - + @@ -13774,55 +8365,36 @@

    Integrity Incident

    - -
    -

    Interception of Communications

    +
    +

    Incident Identifier

    TermIntegrityIncidentIncidentHandlingReport Prefix risk
    LabelIntegrity IncidentIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#IncidentHandlingReport
    Broader/Parent types risk:Incident + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident where the integrity of information or system has been affectedA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    - + - + - + - + - - - - - - - - - - - + + + @@ -13831,34 +8403,28 @@

    Interception of Communications

    - + - - - - + - + - - - - + - @@ -13866,53 +8432,49 @@

    Interception of Communications

    - -
    -

    Internal Operation Disruption

    +
    +

    Incident Impact Assessment

    TermInterceptionCommunicationsIncidentIdentifier Prefix risk
    LabelInterception of CommunicationsIncident Identifier
    IRIhttps://w3id.org/dpv/risk#InterceptionCommunicationshttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInterception of CommunicationsIdentifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13923,23 +8485,20 @@

    Internal Operation Disruption

    - + - - - - + - + @@ -13950,7 +8509,7 @@

    Internal Operation Disruption

    - @@ -13959,56 +8518,44 @@

    Internal Operation Disruption

    - - - - -
    -

    Known Vulnerability Exploited

    +
    +

    Incident Mitigated

    TermInternalOperationDisruptionIncidentImpactAssessment Prefix risk
    LabelInternal Operation DisruptionIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#InternalOperationDisruptionhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionInternal Operation DisruptionAn impact assessment associated with a incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14019,23 +8566,20 @@

    Known Vulnerability Exploited

    - + - - - - + - + @@ -14046,7 +8590,7 @@

    Known Vulnerability Exploited

    - @@ -14054,53 +8598,43 @@

    Known Vulnerability Exploited

    - -
    -

    Law Enforcement Adverse Effects

    +
    +

    Incident Mitigation Measure

    TermKnownVulnerabilityExploitedIncidentMitigated Prefix risk
    LabelKnown Vulnerability ExploitedIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#KnownVulnerabilityExploitedhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionKnown Vulnerability ExploitedThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14111,34 +8645,28 @@

    Law Enforcement Adverse Effects

    - + - - - - + - + - - - - + - @@ -14147,53 +8675,44 @@

    Law Enforcement Adverse Effects

    -
    -

    Limitation of Rights

    +
    +

    Incident Near Miss

    TermLawEnforcementAdverseEffectsIncidentMitigationMeasure Prefix risk
    LabelLaw Enforcement Adverse EffectsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#LawEnforcementAdverseEffectshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure
    DefinitionLaw Enforcement Adverse EffectsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14204,7 +8723,7 @@

    Limitation of Rights

    - + @@ -14217,18 +8736,18 @@

    Limitation of Rights

    - + - + - @@ -14236,54 +8755,45 @@

    Limitation of Rights

    - -
    -

    Loss of Assets

    +
    +

    Incident Notice

    TermLimitationOfRightsIncidentNearMiss Prefix risk
    LabelLimitation of RightsIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#LimitationOfRightshttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLimitation of RightsThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2022-08-182024-02-14
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14294,34 +8804,28 @@

    Loss of Assets

    - + - - - - + - + - - - - + - @@ -14330,53 +8834,44 @@

    Loss of Assets

    -
    -

    Loss of Competitive Advantage

    +
    +

    Incident Ongoing

    TermLossAssetsIncidentNotice Prefix risk
    LabelLoss of AssetsIncident Notice
    IRIhttps://w3id.org/dpv/risk#LossAssetshttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of AssetsNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14387,23 +8882,20 @@

    Loss of Competitive Advantage

    - + - - - - + - + @@ -14414,7 +8906,7 @@

    Loss of Competitive Advantage

    - @@ -14422,54 +8914,46 @@

    Loss of Competitive Advantage

    - -
    -

    Loss of Control over Data

    +
    +

    Incident Ongoing Report

    TermLossCompetitiveAdvantageIncidentOngoing Prefix risk
    LabelLoss of Competitive AdvantageIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#LossCompetitiveAdvantagehttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Competitive AdvantageThe incident is ongoing i.e. still active
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - + + - @@ -14480,7 +8964,7 @@

    Loss of Control over Data

    - + @@ -14493,18 +8977,15 @@

    Loss of Control over Data

    - + - - - - + - @@ -14512,53 +8993,46 @@

    Loss of Control over Data

    - -
    -

    Loss of Credibility

    +
    +

    Incident Preliminary Report

    TermLossControlOverDataIncidentOngoingReport Prefix risk
    LabelLoss of Control over DataIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#LossControlOverDatahttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Control over DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14569,34 +9043,28 @@

    Loss of Credibility

    - + - - - - + - + - - - - + - @@ -14604,53 +9072,45 @@

    Loss of Credibility

    - -
    -

    Loss of Customer Confidence

    +
    +

    Incident Register

    TermLossCredibilityIncidentPreliminaryReport Prefix risk
    LabelLoss of CredibilityIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#LossCredibilityhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CredibilityA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14661,23 +9121,20 @@

    Loss of Customer Confidence

    - + - - - - + - + @@ -14688,7 +9145,7 @@

    Loss of Customer Confidence

    - @@ -14696,54 +9153,45 @@

    Loss of Customer Confidence

    - -
    -

    Loss of Customers

    +
    +

    Incident Report

    TermLossCustomerConfidenceIncidentRegister Prefix risk
    LabelLoss of Customer ConfidenceIncident Register
    IRIhttps://w3id.org/dpv/risk#LossCustomerConfidencehttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Customer ConfidenceA register recording incidentes, their reports, notifications, and other related activities
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14754,34 +9202,28 @@

    Loss of Customers

    - + - - - - + - + - - - - + - @@ -14789,54 +9231,43 @@

    Loss of Customers

    - -
    -

    Loss of Data

    +
    +

    Incident Status

    TermLossCustomersIncidentReport Prefix risk
    LabelLoss of CustomersIncident Report
    IRIhttps://w3id.org/dpv/risk#LossCustomershttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CustomersDocumented information about an incident, its handling, assessments,and notifications
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14847,23 +9278,23 @@

    Loss of Data

    - + + + + - - - - + - + @@ -14874,7 +9305,7 @@

    Loss of Data

    - @@ -14883,53 +9314,44 @@

    Loss of Data

    -
    -

    Loss of Funds

    +
    +

    Incident Status Unknown

    TermLossDataIncidentStatus Prefix risk
    LabelLoss of DataIncident Status
    IRIhttps://w3id.org/dpv/risk#LossDatahttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of DataStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - - - - + - @@ -14940,23 +9362,20 @@

    Loss of Funds

    - + - - - - + - + @@ -14967,7 +9386,7 @@

    Loss of Funds

    - @@ -14976,53 +9395,44 @@

    Loss of Funds

    -
    -

    Loss of Goods

    +
    +

    Incident Suspected

    TermLossFundsIncidentStatusUnknown Prefix risk
    LabelLoss of FundsIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#LossFundshttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of FundsThe status of a incident is unknown
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15033,23 +9443,20 @@

    Loss of Goods

    - + - - - - + - + @@ -15060,7 +9467,7 @@

    Loss of Goods

    - @@ -15068,53 +9475,46 @@

    Loss of Goods

    - -
    -

    Loss of Goodwill

    +
    +

    Incident Suspected Report

    TermLossGoodsIncidentSuspected Prefix risk
    LabelLoss of GoodsIncident Suspected
    IRIhttps://w3id.org/dpv/risk#LossGoodshttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of GoodsThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15125,34 +9525,28 @@

    Loss of Goodwill

    - + - - - - + - + - - - - + - @@ -15161,52 +9555,44 @@

    Loss of Goodwill

    -
    -

    Loss of Negotiating Capacity

    +
    +

    Incident Terminated

    TermLossGoodwillIncidentSuspectedReport Prefix risk
    LabelLoss of GoodwillIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#LossGoodwillhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of GoodwillA report describing the suspicion of an incident in the past or occuring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -15217,23 +9603,20 @@

    Loss of Negotiating Capacity

    - + - - - - - - + + + - + @@ -15244,7 +9627,7 @@

    Loss of Negotiating Capacity

    - @@ -15253,85 +9636,58 @@

    Loss of Negotiating Capacity

    -
    -

    Loss of Opportunity

    +
    +

    Individual Health & Safety

    TermLossNegotiatingCapacityIncidentTerminated Prefix risk
    LabelLoss of Negotiating CapacityIncident Terminated
    IRIhttps://w3id.org/dpv/risk#LossNegotiatingCapacityhttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Negotiating CapacityThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15344,56 +9700,36 @@

    Loss of Opportunity

    - -
    -

    Loss of Proprietary Information

    +
    +

    Individual Risk

    TermLossOpportunityIndividualHealthSafety Prefix risk
    LabelLoss of OpportunityIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#LossOpportunityhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - - - + + + @@ -15402,29 +9738,20 @@

    Loss of Proprietary Information

    - + - - - - + - - - - + - - - - + @@ -15438,54 +9765,39 @@

    Loss of Proprietary Information

    -
    -

    Loss of Reputation

    +
    +

    Injury

    TermLossProprietaryInformationIndividualRisk Prefix risk
    LabelLoss of Proprietary InformationIndividual Risk
    IRIhttps://w3id.org/dpv/risk#LossProprietaryInformationhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Proprietary InformationRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15494,7 +9806,7 @@

    Loss of Reputation

    - + @@ -15512,7 +9824,10 @@

    Loss of Reputation

    - + + + + @@ -15530,86 +9845,61 @@

    Loss of Reputation

    -
    -

    Loss of Resources

    +
    +

    None

    TermLossReputationInjury Prefix risk
    LabelLoss of ReputationInjury
    IRIhttps://w3id.org/dpv/risk#LossReputationhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of ReputationSomething that acts as or causes Injury
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15622,54 +9912,42 @@

    Loss of Resources

    - -
    -

    Loss of Suppliers

    +
    +

    Integrity Incident

    TermLossResourcesIntegrityBreach Prefix risk
    LabelLoss of ResourcesNone
    IRIhttps://w3id.org/dpv/risk#LossResourceshttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Resources
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -15680,34 +9958,28 @@

    Loss of Suppliers

    - + - - - - + - + - - - - + - @@ -15716,55 +9988,40 @@

    Loss of Suppliers

    -
    -

    Loss of Technological Advantage

    +
    +

    Intentional Misuse

    TermLossSuppliersIntegrityIncident Prefix risk
    LabelLoss of SuppliersIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#LossSuppliershttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionLoss of SuppliersIncident where the integrity of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -15773,29 +10030,20 @@

    Loss of Technological Advantage

    - + - - - - + - - - - + - - - - + @@ -15809,54 +10057,40 @@

    Loss of Technological Advantage

    -
    -

    Loss of Trust

    +
    +

    Intercept Communications

    TermLossTechnologicalAdvantageIntentionalMisuse Prefix risk
    LabelLoss of Technological AdvantageIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#LossTechnologicalAdvantagehttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Technological AdvantageIntentional Misuse
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15865,9 +10099,12 @@

    Loss of Trust

    - + - + + + + @@ -15883,7 +10120,10 @@

    Loss of Trust

    - + + + + @@ -15901,52 +10141,39 @@

    Loss of Trust

    -
    -

    Low Likelihood

    +
    +

    Internal Security Threat

    TermLossTrustInterceptCommunications Prefix risk
    LabelLoss of TrustIntercept Communications
    IRIhttps://w3id.org/dpv/risk#LossTrusthttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of TrustSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -15955,12 +10182,9 @@

    Low Likelihood

    - + - - - - + @@ -15969,20 +10193,14 @@

    Low Likelihood

    - - - - + - - - - + - @@ -15991,52 +10209,44 @@

    Low Likelihood

    -
    -

    Low Risk

    + + + + +
    +

    Judicial Costs

    TermLowLikelihoodInternalSecurityThreat Prefix risk
    LabelLow LikelihoodInternal Security Threat
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#InternalSecurityThreat
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowConcepts associated with security threats and issues that originate within the organisation
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - - - - - - - - - - - + + + + + + + - - - - - + @@ -16045,12 +10255,9 @@

    Low Risk

    - + - - - - + @@ -16059,20 +10266,14 @@

    Low Risk

    - - - - + - - - - + - @@ -16081,52 +10282,40 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Judicial Penalty

    TermLowRiskJudicialCosts Prefix risk
    LabelLow RiskJudicial Costs
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that involves or causes judicial costs to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16135,12 +10324,9 @@

    Low Severity

    - + - - - - + @@ -16149,20 +10335,14 @@

    Low Severity

    - - - - + - - - - + - @@ -16171,54 +10351,39 @@

    Low Severity

    -
    -

    Malicious Code Attack

    +
    +

    Legal Risk

    TermLowSeverityJudicialPenalty Prefix risk
    LabelLow SeverityJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowSomething that involves or causes judicial penalties to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -16227,29 +10392,20 @@

    Malicious Code Attack

    - + - - - - + - - - - + - - - - + @@ -16263,54 +10419,40 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Lose of Credibility

    TermMaliciousCodeAttackLegalRisk Prefix risk
    LabelMalicious Code AttackLegal Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIntentional use of software by including or inserting in a system for a harmful purposeRisks and issues that have their basis in legal requirements and enforcement
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16319,7 +10461,7 @@

    Malware Attack

    - + @@ -16328,7 +10470,7 @@

    Malware Attack

    - + @@ -16337,7 +10479,10 @@

    Malware Attack

    - + + + + @@ -16355,54 +10500,40 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Lose of Customer Confidence

    TermMalwareAttackLoseCredibility Prefix risk
    LabelMalware AttackLose of Credibility
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMalware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a systemSomething that acts as or causes Loss of Credibility
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16411,22 +10542,28 @@

    Material Damage

    - + - + + + + - + - + + + + @@ -16444,54 +10581,40 @@

    Material Damage

    -
    -

    Misinformation and Disinformation

    +
    +

    Lose of Goodwill

    TermMaterialDamageLoseCustomerConfidence Prefix risk
    LabelMaterial DamageLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact that acts as or causes material damagesSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-03-302022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16500,7 +10623,7 @@

    Misinformation and Disinformation

    - + @@ -16509,7 +10632,7 @@

    Misinformation and Disinformation

    - + @@ -16518,7 +10641,10 @@

    Misinformation and Disinformation

    - + + + + @@ -16536,53 +10662,40 @@

    Misinformation and Disinformation

    -
    -

    Misuse

    +
    +

    Lose of Negotiating Capacity

    TermMisinformationDisinformationLoseGoodwill Prefix risk
    LabelMisinformation and DisinformationLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#MisinformationDisinformationhttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInformation that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)Something that acts as or causes Loss of Goodwill
    SourceENISA Threat Landscape 2021ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16591,25 +10704,31 @@

    Misuse

    - + - + + + + - + - + + + + - + @@ -16624,54 +10743,40 @@

    Misuse

    -
    -

    Misuse of Breached Information

    +
    +

    Lose of Opportunity

    TermMisuseLoseNegotiatingCapacity Prefix risk
    LabelMisuseLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuseSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-06-112022-08-17
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16680,7 +10785,7 @@

    Misuse of Breached Information

    - + @@ -16698,7 +10803,10 @@

    Misuse of Breached Information

    - + + + + @@ -16716,52 +10824,40 @@

    Misuse of Breached Information

    -
    -

    Moderate Likelihood

    +
    +

    Lose of Reputation

    TermMisuseBreachedInformationLoseOpportunity Prefix risk
    LabelMisuse of Breached InformationLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#MisuseBreachedInformationhttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuse of Breached InformationSomething that acts as or causes Loss of Opportunity
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -16770,25 +10866,28 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -16797,7 +10896,7 @@

    Moderate Likelihood

    - @@ -16806,52 +10905,40 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    +
    +

    Lose of Trust

    TermModerateLikelihoodLoseReputation Prefix risk
    LabelModerate LikelihoodLose of Reputation
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateSomething that acts as or causes Loss of Reputation
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16860,25 +10947,28 @@

    Moderate Risk

    - + - - - - + - + + + + - + - + + + + @@ -16887,7 +10977,7 @@

    Moderate Risk

    - @@ -16896,50 +10986,50 @@

    Moderate Risk

    -
    -

    Moderate Severity

    +
    +

    Low Likelihood

    TermModerateRiskLoseTrust Prefix risk
    LabelModerate RiskLose of Trust
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Loss of Trust
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - @@ -16950,11 +11040,11 @@

    Moderate Severity

    - + - + @@ -16986,46 +11076,50 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Low Risk

    TermModerateSeverityLowLikelihood Prefix risk
    LabelModerate SeverityLow Likelihood
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity + risk:3LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasSeverity + dpv:hasLikelihood
    DefinitionLevel where Severity is ModerateLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    - + - + - + - + - + + + + - @@ -17036,9 +11130,12 @@

    Monitor Consequence

    - + - + + + + @@ -17049,7 +11146,7 @@

    Monitor Consequence

    - + @@ -17060,7 +11157,7 @@

    Monitor Consequence

    - @@ -17069,45 +11166,50 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Low Severity

    TermMonitorConsequenceLowRisk Prefix risk
    LabelMonitor ConsequenceLow Risk
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that monitors a Risk ConsequenceLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -17118,11 +11220,11 @@

    Monitor Control

    - + - + @@ -17134,7 +11236,7 @@

    Monitor Control

    - + @@ -17145,7 +11247,7 @@

    Monitor Control

    - @@ -17154,48 +11256,40 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Malicious Code Attack

    TermMonitorControlLowSeverity Prefix risk
    LabelMonitor ControlLow Severity
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsLevel where Severity is Low
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -17204,22 +11298,28 @@

    Monitor Impact

    - + - + + + + - + - + + + + @@ -17228,7 +11328,7 @@

    Monitor Impact

    - @@ -17237,48 +11337,40 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Malware Attack

    TermMonitorImpactMaliciousCodeAttack Prefix risk
    LabelMonitor ImpactMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17287,22 +11379,28 @@

    Monitor Risk

    - + - + + + + - + - + + + + @@ -17311,7 +11409,7 @@

    Monitor Risk

    - @@ -17320,48 +11418,40 @@

    Monitor Risk

    -
    -

    Monitor Control

    +
    +

    Material Damage

    TermMonitorRiskMalwareAttack Prefix risk
    LabelMonitor RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskSomething that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17370,9 +11460,12 @@

    Monitor Control

    - + - + + + + @@ -17383,9 +11476,12 @@

    Monitor Control

    - + - + + + + @@ -17394,7 +11490,7 @@

    Monitor Control

    - @@ -17403,48 +11499,40 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    +
    +

    Misuse

    TermMonitorRiskControlMaterialDamage Prefix risk
    LabelMonitor ControlMaterial Damage
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17453,7 +11541,7 @@

    Monitor Risk Source

    - + @@ -17466,18 +11554,21 @@

    Monitor Risk Source

    - + - + + + + - + - @@ -17486,46 +11577,50 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    +
    +

    Moderate Likelihood

    TermMonitorRiskSourceMisuse Prefix risk
    LabelMonitor Risk SourceMisuse
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -17536,9 +11631,12 @@

    Monitor Vulnerabilities

    - + - + + + + @@ -17549,7 +11647,7 @@

    Monitor Vulnerabilities

    - + @@ -17560,7 +11658,7 @@

    Monitor Vulnerabilities

    - @@ -17569,52 +11667,50 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    +
    +

    Moderate Risk

    TermMonitorVulnerabilitiesModerateLikelihood Prefix risk
    LabelMonitor VulnerabilitiesModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that monitors a Risk VulnerabilityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17625,9 +11721,12 @@

    Non-Material Damage

    - + - + + + + @@ -17638,7 +11737,7 @@

    Non-Material Damage

    - + @@ -17649,7 +11748,7 @@

    Non-Material Damage

    - @@ -17658,52 +11757,50 @@

    Non-Material Damage

    -
    -

    Organisation Disruption

    +
    +

    Moderate Severity

    TermNonMaterialDamageModerateRisk Prefix risk
    LabelNon-Material DamageModerate Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Damage - → dpv:Risk + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes non-material damagesLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17714,23 +11811,23 @@

    Organisation Disruption

    - + - + + + + - - - - + - + @@ -17741,7 +11838,7 @@

    Organisation Disruption

    - @@ -17750,49 +11847,46 @@

    Organisation Disruption

    -
    -

    Payment

    +
    +

    Monitor Consequence

    TermOrganisationDisruptionModerateSeverity Prefix risk
    LabelOrganisation DisruptionModerate Severity
    IRIhttps://w3id.org/dpv/risk#OrganisationDisruptionhttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionOrganisation DisruptionLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -17803,7 +11897,7 @@

    Payment

    - + @@ -17816,18 +11910,18 @@

    Payment

    - + - + - @@ -17836,53 +11930,45 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Monitor Control

    TermPaymentMonitorConsequence Prefix risk
    LabelPaymentMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPayment provided as compensation (as an impact)Control that monitors a Risk Consequence
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17893,23 +11979,23 @@

    Personal Safety Endangerment

    - + - + + + + - - - - + - + @@ -17920,7 +12006,7 @@

    Personal Safety Endangerment

    - @@ -17929,53 +12015,46 @@

    Personal Safety Endangerment

    -
    -

    Personnel Absence

    +
    +

    Monitor Impact

    TermPersonalSafetyEndangermentMonitorControl Prefix risk
    LabelPersonal Safety EndangermentMonitor Control
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonal Safety EndangermentRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17986,23 +12065,20 @@

    Personnel Absence

    - + - - - - + - + @@ -18013,7 +12089,7 @@

    Personnel Absence

    - @@ -18022,53 +12098,46 @@

    Personnel Absence

    -
    -

    Phishing Scam

    +
    +

    Monitor Risk

    TermPersonnelAbsenceMonitorImpact Prefix risk
    LabelPersonnel AbsenceMonitor Impact
    IRIhttps://w3id.org/dpv/risk#PersonnelAbsencehttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonnel AbsenceControl that monitors a Risk Impact
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18079,23 +12148,20 @@

    Phishing Scam

    - + - - - - + - + @@ -18106,7 +12172,7 @@

    Phishing Scam

    - @@ -18115,53 +12181,46 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Monitor Control

    TermPhishingScamMonitorRisk Prefix risk
    LabelPhishing ScamMonitor Risk
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA type of social engineering attack involving deceptive messages intended to reveal sensitive informationControl that monitors a Risk
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18172,23 +12231,20 @@

    Physical Assault

    - + - - - - + - + @@ -18199,7 +12255,7 @@

    Physical Assault

    - @@ -18208,53 +12264,46 @@

    Physical Assault

    -
    -

    Physical Spying

    +
    +

    Monitor Risk Source

    TermPhysicalAssaultMonitorRiskControl Prefix risk
    LabelPhysical AssaultMonitor Control
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical AssaultControl that monitors another Control
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18265,23 +12314,20 @@

    Physical Spying

    - + - - - - + - + @@ -18292,7 +12338,7 @@

    Physical Spying

    - @@ -18301,53 +12347,46 @@

    Physical Spying

    -
    -

    Physical Stalking

    +
    +

    Monitor Vulnerabilities

    TermPhysicalSpyingMonitorRiskSource Prefix risk
    LabelPhysical SpyingMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#PhysicalSpyinghttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical SpyingControl that monitors a Risk Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18358,23 +12397,20 @@

    Physical Stalking

    - + - - - - + - + @@ -18385,7 +12421,7 @@

    Physical Stalking

    - @@ -18394,55 +12430,40 @@

    Physical Stalking

    -
    -

    Prevent Exercising of Rights

    +
    +

    Non-Material Damage

    TermPhysicalStalkingMonitorVulnerabilities Prefix risk
    LabelPhysical StalkingMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#PhysicalStalkinghttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical StalkingControl that monitors a Risk Vulnerability
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -18451,9 +12472,12 @@

    Prevent Exercising of Rights

    - + - + + + + @@ -18464,12 +12488,15 @@

    Prevent Exercising of Rights

    - + - + + + + - + @@ -18484,53 +12511,39 @@

    Prevent Exercising of Rights

    -
    -

    Privacy impact

    +
    +

    Operational Security Risk

    TermPreventExercisingOfRightsNonMaterialDamage Prefix risk
    LabelPrevent Exercising of RightsNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#PreventExercisingOfRightshttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrevent Exercising of RightsSomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-08-182022-03-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18539,29 +12552,20 @@

    Privacy impact

    - + - - - - + - - - - + - - - - + @@ -18575,55 +12579,40 @@

    Privacy impact

    -
    -

    Psychological Harm

    +
    +

    Payment

    TermPrivacyImpactOperationalSecurityRisk Prefix risk
    LabelPrivacy impactOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#PrivacyImpacthttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrivacy impactRisks and issues that arise during operational processes
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18632,28 +12621,28 @@

    Psychological Harm

    - + - - - - + - + - + + + + - + @@ -18668,54 +12657,40 @@

    Psychological Harm

    -
    -

    Public Order Breach

    +
    +

    Personal Safety Endangerment

    TermPsychologicalHarmPayment Prefix risk
    LabelPsychological HarmPayment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPsychological HarmSomething that acts as or provides payment e.g. to access a service or purchase resources
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18724,7 +12699,7 @@

    Public Order Breach

    - + @@ -18742,7 +12717,10 @@

    Public Order Breach

    - + + + + @@ -18760,55 +12738,40 @@

    Public Order Breach

    -
    -

    Ransomware Attack

    +
    +

    Phishing Scam

    TermPublicOrderBreachPersonalSafetyEndangerment Prefix risk
    LabelPublic Order BreachPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPublic Order BreachSomething that acts as or causes Personal Safety Endangerment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18817,7 +12780,7 @@

    Ransomware Attack

    - + @@ -18826,7 +12789,7 @@

    Ransomware Attack

    - + @@ -18835,7 +12798,10 @@

    Ransomware Attack

    - + + + + @@ -18853,47 +12819,39 @@

    Ransomware Attack

    -
    -

    Recovery Control

    +
    +

    Physical Assault

    TermRansomwareAttackPhishingScam Prefix risk
    LabelRansomware AttackPhishing Scam
    IRIhttps://w3id.org/dpv/risk#RansomwareAttackhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRansomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentialitySomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -18902,28 +12860,37 @@

    Recovery Control

    - + - + + + + - + - - + + + + + + + + - @@ -18932,58 +12899,46 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Physical Harm

    TermRecoveryControlPhysicalAssault Prefix risk
    LabelRecovery ControlPhysical Assault
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSomething that acts as or causes Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -18993,20 +12948,14 @@

    Reduce Likelihood

    - - - - + - - - - + - @@ -19015,58 +12964,46 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Privacy

    TermReduceLikelihoodPhysicalHarm Prefix risk
    LabelReduce LikelihoodPhysical Harm
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -19076,20 +13013,14 @@

    Reduce Severity

    - - - - + - - - - + - @@ -19098,47 +13029,39 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Psychological Harm

    TermReduceSeverityPrivacy Prefix risk
    LabelReduce SeverityPrivacy
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -19147,28 +13070,37 @@

    Reduction Control

    - + - + + + + - + - - + + + + + + + + - @@ -19177,55 +13109,40 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Public Order Breach

    TermReductionControlPsychologicalHarm Prefix risk
    LabelReduction ControlPsychological Harm
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or causes Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -19234,22 +13151,28 @@

    Re-identification

    - + - + + + + - + - + + + + @@ -19267,23 +13190,23 @@

    Re-identification

    -
    -

    Remedy Control

    +
    +

    Recovery Control

    TermReidentificationPublicOrderBreach Prefix risk
    LabelRe-identificationPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRe-identificationSomething that acts as or causes Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + @@ -19316,7 +13239,7 @@

    Remedy Control

    - + @@ -19346,53 +13269,46 @@

    Remedy Control

    -
    -

    Remote Spying

    +
    +

    Reduce Likelihood

    TermRemedyControlRecoveryControl Prefix risk
    LabelRemedy ControlRecovery Control
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RecoveryControl
    DefinitionControl to remedy consequences of eventControl to recover from event
    - + - + - + - + - - - - - + - @@ -19403,23 +13319,20 @@

    Remote Spying

    - + - - - - + - + @@ -19430,7 +13343,7 @@

    Remote Spying

    - @@ -19439,23 +13352,23 @@

    Remote Spying

    -
    -

    Remove Consequence

    +
    +

    Reduce Severity

    TermRemoteSpyingReduceLikelihood Prefix risk
    LabelRemote SpyingReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#RemoteSpyinghttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRemote SpyingControl that reduces the likelihood of an event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -19467,7 +13380,7 @@

    Remove Consequence

    - - + @@ -19522,23 +13435,23 @@

    Remove Consequence

    -
    -

    Remove Impact

    +
    +

    Reduction Control

    TermRemoveConsequenceReduceSeverity Prefix risk
    LabelRemove ConsequenceReduce Severity
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#ReduceSeverity
    Broader/Parent types risk:ConsequenceControl + risk:ReductionControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -19489,7 +13402,7 @@

    Remove Consequence

    DefinitionControl that removes Consequence i.e. prevents it from materialisingControl that reduces the severity of an event
    - + - + - + @@ -19550,8 +13463,7 @@

    Remove Impact

    - @@ -19572,7 +13484,7 @@

    Remove Impact

    - + @@ -19586,12 +13498,9 @@

    Remove Impact

    - - - - - - + + + @@ -19605,48 +13514,42 @@

    Remove Impact

    -
    -

    Remove Source

    + + +
    +

    Re-identification

    TermRemoveImpactReductionControl Prefix risk
    LabelRemove ImpactReduction Control
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#ReductionControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that removes Impact i.e. prevents it from materialisingControl that reduces the likelihood or severity of an event
    Date Created 2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -19655,9 +13558,12 @@

    Remove Source

    - + - + + + + @@ -19668,9 +13574,12 @@

    Remove Source

    - + - + + + + @@ -19679,7 +13588,7 @@

    Remove Source

    - @@ -19688,49 +13597,45 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Remedy Control

    TermRemoveSourceReidentification Prefix risk
    LabelRemove SourceRe-identification
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceSomething that acts as or causes Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2024-05-192022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -19741,7 +13646,7 @@

    Remuneration

    - + @@ -19754,18 +13659,15 @@

    Remuneration

    - + - - - - + - @@ -19774,52 +13676,46 @@

    Remuneration

    -
    -

    Replacement Costs

    +
    +

    Remove Consequence

    TermRenumerationRemedyControl Prefix risk
    LabelRemunerationRemedy Control
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRenumeration provided as compensation (as an impact)Control to remedy consequences of event
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19830,23 +13726,20 @@

    Replacement Costs

    - + - - - - + - + @@ -19857,7 +13750,7 @@

    Replacement Costs

    - @@ -19866,51 +13759,46 @@

    Replacement Costs

    -
    -

    Reputation and trust impact

    +
    +

    Remove Impact

    TermReplacementCostsRemoveConsequence Prefix risk
    LabelReplacement CostsRemove Consequence
    IRIhttps://w3id.org/dpv/risk#ReplacementCostshttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReplacement CostsControl that removes Consequence i.e. prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19921,23 +13809,20 @@

    Reputation and trust impact

    - + - - - - + - + @@ -19948,7 +13833,7 @@

    Reputation and trust impact

    - @@ -19957,52 +13842,46 @@

    Reputation and trust impact

    -
    -

    Retrieval of Deleted Data

    +
    +

    Remove Source

    TermReputationTrustImpactRemoveImpact Prefix risk
    LabelReputation and trust impactRemove Impact
    IRIhttps://w3id.org/dpv/risk#ReputationTrustImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReputation and trust impactControl that removes Impact i.e. prevents it from materialising
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -20013,23 +13892,20 @@

    Retrieval of Deleted Data

    - + - - - - + - + @@ -20040,7 +13916,7 @@

    Retrieval of Deleted Data

    - @@ -20049,54 +13925,40 @@

    Retrieval of Deleted Data

    -
    -

    Retrieval of Discarded Equipment

    +
    +

    Remuneration

    TermRetrievalDeletedDataRemoveSource Prefix risk
    LabelRetrieval of Deleted DataRemove Source
    IRIhttps://w3id.org/dpv/risk#RetrievalDeletedDatahttps://w3id.org/dpv/risk#RemoveSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRetrieval of Deleted DataControl that removes the risk source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -20105,28 +13967,28 @@

    Retrieval of Discarded Equipment

    - + - - - - + - + - + + + + - + @@ -20141,51 +14003,39 @@

    Retrieval of Discarded Equipment

    -
    -

    Reward

    +
    +

    Reputational Risk

    TermRetrievalDiscardedEquipmentRenumeration Prefix risk
    LabelRetrieval of Discarded EquipmentRemuneration
    IRIhttps://w3id.org/dpv/risk#RetrievalDiscardedEquipmenthttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRetrieval of Discarded EquipmentSomething that acts as or provides renumeration which is in monetary or financial form
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -20194,7 +14044,7 @@

    Reward

    - + @@ -20205,15 +14055,9 @@

    Reward

    - - - - + - - - - + @@ -20224,42 +14068,39 @@

    Reward

    TermRewardReputationalRisk Prefix risk
    LabelRewardReputational Risk
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionReward provided as compensation (as an impact)Risks and issues that affect the reputation of the organisation
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - - - - -
    -

    Risk Analysis

    + +
    +

    Reward

    - + - + - + - + - @@ -20272,34 +14113,34 @@

    Risk Analysis

    - + - - - - + - + - + + + + - + - @@ -20307,35 +14148,37 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Prevent Exercising of Rights

    TermRiskAnalysisReward Prefix risk
    LabelRisk AnalysisReward
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:FinancialImpact + → dpv:RiskConcept
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    SourceIEC 31010:2019
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20348,31 +14191,37 @@

    Risk Assessment

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20380,44 +14229,49 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Impact to Rights

    TermRiskAssessmentRightsExercisePrevention Prefix risk
    LabelRisk AssessmentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionAssessment of risk involving its identification, analysis, and evaluationSomething that acts as or causes Prevent Exercising of Rights
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Source
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + - @@ -20428,31 +14282,40 @@

    Risk Control

    - + + + + + - - - - - + + + + - + - - + + + + + + + + - @@ -20460,33 +14323,38 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Limitation of Rights

    TermRiskControlRightsImpact Prefix risk
    LabelRisk ControlImpact to Rights
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
    DefinitionControl that modifies riskSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -20498,31 +14366,37 @@

    Risk Management

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20531,36 +14405,36 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Violation of Rights

    TermRiskManagementRightsLimitation Prefix risk
    LabelRisk ManagementLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskSomething that acts as or causes Limitation of Rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Source
    Date Created2024-06-122022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20573,72 +14447,77 @@

    Risk Matrix

    - + - + + + + - - - - + - + - + + + + - + -
    TermRiskMatrixRightsViolation Prefix risk
    LabelRisk MatrixViolation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Something that acts as or causes Violation of Rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    + + + + - -
    -

    Risk Matrix 3x3

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -20652,20 +14531,23 @@

    Risk Matrix 3x3

    - + - + + + + - + @@ -20676,7 +14558,7 @@

    Risk Matrix 3x3

    - @@ -20684,38 +14566,35 @@

    Risk Matrix 3x3

    - -
    -

    Risk Matrix 5x5

    +
    +

    Risk Assessment

    TermRiskMatrix3x3RiskAnalysis Prefix risk
    LabelRisk Matrix 3x3Risk Analysis
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-172022-08-18
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - @@ -20728,31 +14607,31 @@

    Risk Matrix 5x5

    - + - + + + + - + - - - - + - @@ -20760,42 +14639,46 @@

    Risk Matrix 5x5

    - -
    -

    Risk Matrix 7x7

    +
    +

    Risk Control

    TermRiskMatrix5x5RiskAssessment Prefix risk
    LabelRisk Matrix 5x5Risk Assessment
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -20804,10 +14687,13 @@

    Risk Matrix 7x7

    - + + + + @@ -20817,18 +14703,15 @@

    Risk Matrix 7x7

    - + - - - - + - @@ -20836,23 +14719,23 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    +
    +

    Risk Management

    TermRiskMatrix7x7RiskControl Prefix risk
    LabelRisk Matrix 7x7Risk Control
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in DEX
    - + - + - + @@ -20865,11 +14748,7 @@

    Risk Source

    - - - - + @@ -20878,20 +14757,23 @@

    Risk Source

    - + - + + + + - + @@ -20908,37 +14790,35 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Risk Matrix

    TermRiskSourceRiskManagement Prefix risk
    LabelRisk SourceRisk Management
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-02-142024-06-12
    - + - + - + - + - @@ -20952,20 +14832,23 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + - + @@ -20976,7 +14859,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - @@ -20985,23 +14868,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Risk Matrix 3x3

    TermRM3x3S1L1RiskMatrix Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Risk Matrix
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2022-08-172024-02-14
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21013,8 +14896,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - @@ -21029,7 +14911,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - + @@ -21062,23 +14944,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Risk Matrix 5x5

    TermRM3x3S1L2RiskMatrix3x3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Risk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RiskMatrix3x3
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    - + - + - + @@ -21090,8 +14972,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - @@ -21106,7 +14987,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + @@ -21139,23 +15020,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Risk Matrix 7x7

    TermRM3x3S1L3RiskMatrix5x5 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Risk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RiskMatrix5x5
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    - + - + - + @@ -21167,8 +15048,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - @@ -21183,7 +15063,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - + @@ -21215,43 +15095,43 @@

    Low Risk (RM3x3 S:2 L:1)

    - -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Risk Source

    TermRM3x3S2L1RiskMatrix7x7 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Risk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RiskMatrix7x7
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    - + - + - + - + - - + + + + @@ -21260,7 +15140,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + @@ -21273,18 +15153,18 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + - - - - + + + + - @@ -21293,23 +15173,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRM3x3S2L2RiskSource Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Risk Source
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Date Modified2024-08-16
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21337,7 +15217,7 @@

    High Risk (RM3x3 S:2 L:3)

    - + @@ -21370,23 +15250,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRM3x3S2L3RM3x3S1L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Low Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM3x3S1L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21414,7 +15294,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - + @@ -21447,23 +15327,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRM3x3S3L1RM3x3S1L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM3x3S1L2
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -21491,7 +15371,7 @@

    High Risk (RM3x3 S:3 L:2)

    - + @@ -21524,23 +15404,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRM3x3S3L2RM3x3S1L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM3x3S1L3
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -21568,7 +15448,7 @@

    High Risk (RM3x3 S:3 L:3)

    - + @@ -21601,23 +15481,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRM3x3S3L3RM3x3S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM3x3S2L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21629,7 +15509,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - - + @@ -21678,23 +15558,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRM5x5S1L1RM3x3S2L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Moderate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM3x3S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21645,7 +15525,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -21706,7 +15586,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - - + @@ -21755,23 +15635,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRM5x5S1L2RM3x3S2L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21722,7 +15602,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -21783,7 +15663,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - - + @@ -21832,23 +15712,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRM5x5S1L3RM3x3S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21799,7 +15679,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -21860,7 +15740,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - - + @@ -21909,23 +15789,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRM5x5S1L4RM3x3S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21876,7 +15756,7 @@

    Low Risk (RM5x5 S:1 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -21937,7 +15817,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - - + @@ -21986,23 +15866,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRM5x5S1L5RM3x3S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM3x3S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21953,7 +15833,7 @@

    Low Risk (RM5x5 S:1 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22030,7 +15910,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -22063,23 +15943,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM5x5S2L1RM5x5S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S1L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22107,7 +15987,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -22140,23 +16020,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM5x5S2L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S1L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22184,7 +16064,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -22217,23 +16097,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM5x5S2L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S1L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22261,7 +16141,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -22294,23 +16174,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM5x5S2L4RM5x5S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S1L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22338,7 +16218,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -22371,23 +16251,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM5x5S2L5RM5x5S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S1L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -22415,7 +16295,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -22448,23 +16328,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM5x5S3L1RM5x5S2L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S2L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22492,7 +16372,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -22525,23 +16405,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM5x5S3L2RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S2L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -22569,7 +16449,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -22602,23 +16482,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM5x5S3L3RM5x5S2L3 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S2L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -22646,7 +16526,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -22679,23 +16559,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM5x5S3L4RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S2L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -22723,7 +16603,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -22756,23 +16636,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S3L5RM5x5S2L5 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -22800,7 +16680,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -22833,23 +16713,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S4L1RM5x5S3L1 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22877,7 +16757,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - + @@ -22910,23 +16790,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S4L2RM5x5S3L2 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22954,7 +16834,7 @@

    High Risk (RM5x5 S:4 L:3)

    - + @@ -22987,23 +16867,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S4L3RM5x5S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23031,7 +16911,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - + @@ -23064,23 +16944,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S4L4RM5x5S3L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23108,7 +16988,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - + @@ -23141,23 +17021,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S4L5RM5x5S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23185,7 +17065,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - + @@ -23218,23 +17098,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S5L1RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23262,7 +17142,7 @@

    High Risk (RM5x5 S:5 L:2)

    - + @@ -23295,23 +17175,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S5L2RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23339,7 +17219,7 @@

    High Risk (RM5x5 S:5 L:3)

    - + @@ -23372,23 +17252,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S5L3RM5x5S4L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23416,7 +17296,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - + @@ -23449,23 +17329,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S5L4RM5x5S4L4 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23493,7 +17373,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - + @@ -23526,23 +17406,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S5L5RM5x5S4L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23554,7 +17434,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - - + @@ -23603,23 +17483,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM7x7S1L1RM5x5S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23570,7 +17450,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23631,7 +17511,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - - + @@ -23680,23 +17560,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM7x7S1L2RM5x5S5L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23647,7 +17527,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -23708,7 +17588,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - - + @@ -23757,23 +17637,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM7x7S1L3RM5x5S5L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23724,7 +17604,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23785,7 +17665,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - - + @@ -23834,23 +17714,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM7x7S1L4RM5x5S5L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23801,7 +17681,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23862,7 +17742,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - - + @@ -23911,23 +17791,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM7x7S1L5RM5x5S5L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23878,7 +17758,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23955,7 +17835,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -23988,23 +17868,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM7x7S1L6RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S1L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24032,7 +17912,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -24065,23 +17945,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM7x7S1L7RM7x7S1L2 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S1L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24109,7 +17989,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -24142,23 +18022,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM7x7S2L1RM7x7S1L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S1L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24186,7 +18066,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -24219,23 +18099,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM7x7S2L2RM7x7S1L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S1L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24263,7 +18143,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -24296,23 +18176,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM7x7S2L3RM7x7S1L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S1L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -24340,7 +18220,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -24373,23 +18253,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S2L4RM7x7S1L6 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S1L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24417,7 +18297,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -24450,23 +18330,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM7x7S2L5RM7x7S1L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S1L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -24494,7 +18374,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -24527,23 +18407,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM7x7S2L6RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S2L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24571,7 +18451,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -24604,23 +18484,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM7x7S2L7RM7x7S2L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S2L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24648,7 +18528,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -24681,23 +18561,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM7x7S3L1RM7x7S2L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S2L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -24725,7 +18605,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -24758,23 +18638,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S3L2RM7x7S2L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -24802,7 +18682,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -24835,23 +18715,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S3L3RM7x7S2L5 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -24879,7 +18759,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -24912,23 +18792,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S3L4RM7x7S2L6 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -24956,7 +18836,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -24989,23 +18869,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S3L5RM7x7S2L7 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25033,7 +18913,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -25066,23 +18946,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S3L6RM7x7S3L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25110,7 +18990,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -25143,23 +19023,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S3L7RM7x7S3L2 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25187,7 +19067,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -25220,23 +19100,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S4L1RM7x7S3L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25264,7 +19144,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -25297,23 +19177,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S4L2RM7x7S3L4 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25341,7 +19221,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -25374,23 +19254,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S4L3RM7x7S3L5 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25418,7 +19298,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -25451,23 +19331,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S4L4RM7x7S3L6 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -25495,7 +19375,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -25528,23 +19408,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S4L5RM7x7S3L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -25572,7 +19452,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -25605,23 +19485,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S4L6RM7x7S4L1 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25649,7 +19529,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -25682,23 +19562,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S4L7RM7x7S4L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -25726,7 +19606,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -25759,23 +19639,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S5L1RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -25803,7 +19683,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -25836,23 +19716,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S5L2RM7x7S4L4 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -25880,7 +19760,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -25913,23 +19793,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S5L3RM7x7S4L5 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25957,7 +19837,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -25990,23 +19870,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S5L4RM7x7S4L6 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26034,7 +19914,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -26067,23 +19947,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S5L5RM7x7S4L7 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26111,7 +19991,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -26144,23 +20024,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S5L6RM7x7S5L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26188,7 +20068,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -26221,23 +20101,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S5L7RM7x7S5L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26265,7 +20145,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -26298,23 +20178,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S6L1RM7x7S5L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26342,7 +20222,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -26375,23 +20255,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S6L2RM7x7S5L4 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26419,7 +20299,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -26452,23 +20332,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S6L3RM7x7S5L5 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -26496,7 +20376,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -26529,23 +20409,23 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S6L4RM7x7S5L6 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -26573,7 +20453,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -26606,23 +20486,23 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S6L5RM7x7S5L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -26650,7 +20530,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + @@ -26683,23 +20563,23 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S6L6RM7x7S6L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26727,7 +20607,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -26760,23 +20640,23 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S6L7RM7x7S6L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -26804,7 +20684,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - + @@ -26837,23 +20717,23 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S7L1RM7x7S6L3 Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -26881,7 +20761,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -26914,23 +20794,23 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S7L2RM7x7S6L4 Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -26958,7 +20838,7 @@

    High Risk (RM7x7 S:7 L:3)

    - + @@ -26991,23 +20871,23 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S7L3RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27035,7 +20915,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + @@ -27068,23 +20948,23 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S7L4RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27112,7 +20992,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -27145,23 +21025,23 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S7L5RM7x7S6L7 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27189,7 +21069,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -27222,23 +21102,23 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S7L6RM7x7S7L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27266,7 +21146,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -27299,55 +21179,42 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Sabotage

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S7L7RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + - + - - - - - - - - - + + @@ -27356,17 +21223,14 @@

    Sabotage

    - + - - - - + @@ -27383,7 +21247,7 @@

    Sabotage

    - @@ -27392,55 +21256,42 @@

    Sabotage

    -
    -

    Scam

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermSabotageRM7x7S7L3 Prefix risk
    LabelSabotageHigh Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#RM7x7S7L3
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSabotageNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27449,17 +21300,14 @@

    Scam

    - + - - - - + @@ -27476,7 +21324,7 @@

    Scam

    - @@ -27485,53 +21333,42 @@

    Scam

    -
    -

    Security Breach

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermScamRM7x7S7L4 Prefix risk
    LabelScamVery High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#RM7x7S7L4
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionScamNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27540,17 +21377,14 @@

    Security Breach

    - + - - - - + @@ -27567,7 +21401,7 @@

    Security Breach

    - @@ -27576,59 +21410,42 @@

    Security Breach

    - - - - - -
    -

    Service Interruption

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermSecurityBreachRM7x7S7L5 Prefix risk
    LabelSecurity BreachExtremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#RM7x7S7L5
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSecurity BreachNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27637,17 +21454,14 @@

    Service Interruption

    - + - - - - + @@ -27664,7 +21478,7 @@

    Service Interruption

    - @@ -27673,55 +21487,42 @@

    Service Interruption

    -
    -

    Sexual Violence

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermServiceInterruptionRM7x7S7L6 Prefix risk
    LabelService InterruptionExtremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#ServiceInterruptionhttps://w3id.org/dpv/risk#RM7x7S7L6
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionService InterruptionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27730,17 +21531,14 @@

    Sexual Violence

    - + - - - - + @@ -27757,7 +21555,7 @@

    Sexual Violence

    - @@ -27766,47 +21564,40 @@

    Sexual Violence

    -
    -

    Share Risk

    +
    +

    Sabotage

    TermSexualViolenceRM7x7S7L7 Prefix risk
    LabelSexual ViolenceExtremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#RM7x7S7L7
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSexual ViolenceNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -27815,22 +21606,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -27839,7 +21636,7 @@

    Share Risk

    - @@ -27848,53 +21645,40 @@

    Share Risk

    -
    -

    Social Disadvantage

    +
    +

    Scam

    TermShareRiskSabotage Prefix risk
    LabelShare RiskSabotage
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27903,25 +21687,31 @@

    Social Disadvantage

    - + - + + + + - + - + + + + - + @@ -27936,47 +21726,40 @@

    Social Disadvantage

    -
    -

    Source Control

    +
    +

    Security Attack

    TermSocialDisadvantageScam Prefix risk
    LabelSocial DisadvantageScam
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSocial DisadvantageSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -27985,7 +21768,7 @@

    Source Control

    - + @@ -27996,20 +21779,14 @@

    Source Control

    - - - - + - - - - + - @@ -28018,55 +21795,40 @@

    Source Control

    -
    -

    Spam

    +
    +

    Security Breach

    TermSourceControlSecurityAttack Prefix risk
    LabelSource ControlSecurity Attack
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28075,7 +21837,7 @@

    Spam

    - + @@ -28084,7 +21846,7 @@

    Spam

    - + @@ -28093,7 +21855,10 @@

    Spam

    - + + + + @@ -28111,55 +21876,44 @@

    Spam

    -
    -

    Spoofing

    + + + + + +
    +

    Sexual Violence

    TermSpamSecurityBreach Prefix risk
    LabelSpamSecurity Breach
    IRIhttps://w3id.org/dpv/risk#Spamhttps://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpamSomething that acts as or causes Security Breach
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28168,7 +21922,7 @@

    Spoofing

    - + @@ -28177,7 +21931,7 @@

    Spoofing

    - + @@ -28186,7 +21940,10 @@

    Spoofing

    - + + + + @@ -28204,53 +21961,45 @@

    Spoofing

    -
    -

    Spying

    +
    +

    Share Risk

    TermSpoofingSexualViolence Prefix risk
    LabelSpoofingSexual Violence
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpoofingSomething that acts as or causes Sexual Violence
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28261,23 +22010,20 @@

    Spying

    - + - - - - + - + @@ -28288,7 +22034,7 @@

    Spying

    - @@ -28297,55 +22043,40 @@

    Spying

    -
    -

    Stalking

    +
    +

    Social Disadvantage

    TermSpyingShareRisk Prefix risk
    LabelSpyingShare Risk
    IRIhttps://w3id.org/dpv/risk#Spyinghttps://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSpyingRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28354,28 +22085,28 @@

    Stalking

    - + - - - - + - + - + + + + - + @@ -28390,85 +22121,59 @@

    Stalking

    -
    -

    System Failure

    +
    +

    Societal Health & Safety

    TermStalkingSocialDisadvantage Prefix risk
    LabelStalkingSocial Disadvantage
    IRIhttps://w3id.org/dpv/risk#Stalkinghttps://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionStalkingSomething that acts as or causes Social Disadvantage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -28482,54 +22187,39 @@

    System Failure

    -
    -

    System Intrusion

    +
    +

    Societal Risk

    TermSystemFailureSocietalHealthSafety Prefix risk
    LabelSystem FailureSocietal Health & Safety
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem Failure
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28538,29 +22228,20 @@

    System Intrusion

    - + - - - - + - - - - + - - - - + @@ -28574,52 +22255,45 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Source Control

    TermSystemIntrusionSocietalRisk Prefix risk
    LabelSystem IntrusionSocietal Risk
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem IntrusionRisks and issues that affect or have the potential to affect society at large or specific groups in society
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28630,23 +22304,20 @@

    System Malfunction

    - + - - - - + - + @@ -28657,7 +22328,7 @@

    System Malfunction

    - @@ -28666,55 +22337,44 @@

    System Malfunction

    -
    -

    Terrorism

    +
    +

    Spoofing

    TermSystemMalfunctionSourceControl Prefix risk
    LabelSystem MalfunctionSource Control
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSystem MalfunctionRisk Mitigation Measure that controls the Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - - - - - + + @@ -28723,7 +22383,7 @@

    Terrorism

    - + @@ -28732,7 +22392,7 @@

    Terrorism

    - + @@ -28741,7 +22401,10 @@

    Terrorism

    - + + + + @@ -28759,55 +22422,40 @@

    Terrorism

    -
    -

    Theft

    +
    +

    System Failure

    TermTerrorismSpoofing Prefix risk
    LabelTerrorismSpoofing
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTerrorismSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28816,16 +22464,19 @@

    Theft

    - + - + + + + - + @@ -28834,7 +22485,10 @@

    Theft

    - + + + + @@ -28852,55 +22506,40 @@

    Theft

    -
    -

    Theft of Equipment

    +
    +

    System Intrusion

    TermTheftSystemFailure Prefix risk
    LabelTheftSystem Failure
    IRIhttps://w3id.org/dpv/risk#Thefthttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheftSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28909,7 +22548,7 @@

    Theft of Equipment

    - + @@ -28918,7 +22557,7 @@

    Theft of Equipment

    - + @@ -28927,7 +22566,10 @@

    Theft of Equipment

    - + + + + @@ -28945,55 +22587,40 @@

    Theft of Equipment

    -
    -

    Theft of Media

    +
    +

    System Malfunction

    TermTheftEquipmentSystemIntrusion Prefix risk
    LabelTheft of EquipmentSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#TheftEquipmenthttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of EquipmentSomething that acts as or causes System Intrusion
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29002,9 +22629,12 @@

    Theft of Media

    - + - + + + + @@ -29020,7 +22650,10 @@

    Theft of Media

    - + + + + @@ -29038,54 +22671,40 @@

    Theft of Media

    -
    -

    Third Party Operation Disruption

    +
    +

    Terrorism

    TermTheftMediaSystemMalfunction Prefix risk
    LabelTheft of MediaSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#TheftMediahttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of MediaSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29094,7 +22713,7 @@

    Third Party Operation Disruption

    - + @@ -29112,7 +22731,10 @@

    Third Party Operation Disruption

    - + + + + @@ -29158,6 +22780,7 @@

    Threat

    @@ -29305,31 +22928,17 @@

    Unauthorised Access to Premises

    - + - - - - - - - - - + + @@ -29338,7 +22947,7 @@

    Unauthorised Access to Premises

    - + @@ -29356,7 +22965,10 @@

    Unauthorised Access to Premises

    - + + + + @@ -29374,54 +22986,40 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Code Access

    +
    +

    Unauthorised Activity

    TermThirdPartyOperationDisruptionTerrorism Prefix risk
    LabelThird Party Operation DisruptionTerrorism
    IRIhttps://w3id.org/dpv/risk#ThirdPartyOperationDisruptionhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionThird Party Operation DisruptionSomething that acts as or causes Terrorism
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Broader/Parent types risk:RiskSource + → dpv:RiskConcept
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Access to PremisesSomething that acts as or causes Unauthorised Access to Premises
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29430,29 +23028,20 @@

    Unauthorised Code Access

    - + - - - - + - - - - + - - - - + @@ -29466,54 +23055,40 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Unauthorised Code Access

    TermUnauthorisedCodeAccessUnauthorisedActivity Prefix risk
    LabelUnauthorised Code AccessUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code AccessSomething that acts as or causes Unauthorised Activity
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29522,7 +23097,7 @@

    Unauthorised Code Disclosure

    - + @@ -29540,7 +23115,10 @@

    Unauthorised Code Disclosure

    - + + + + @@ -29558,54 +23136,40 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Unauthorised Code Disclosure

    TermUnauthorisedCodeDisclosureUnauthorisedCodeAccess Prefix risk
    LabelUnauthorised Code DisclosureUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code DisclosureSomething that acts as or causes Unauthorised Code Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29614,7 +23178,7 @@

    Unauthorised Code Modification

    - + @@ -29632,7 +23196,10 @@

    Unauthorised Code Modification

    - + + + + @@ -29650,54 +23217,40 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Unauthorised Code Modification

    TermUnauthorisedCodeModificationUnauthorisedCodeDisclosure Prefix risk
    LabelUnauthorised Code ModificationUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code ModificationSomething that acts as or causes Unauthorised Code Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29706,7 +23259,7 @@

    Unauthorised Data Access

    - + @@ -29715,7 +23268,7 @@

    Unauthorised Data Access

    - + @@ -29724,7 +23277,10 @@

    Unauthorised Data Access

    - + + + + @@ -29742,54 +23298,40 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Unauthorised Data Access

    TermUnauthorisedDataAccessUnauthorisedCodeModification Prefix risk
    LabelUnauthorised Data AccessUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data AccessSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29798,7 +23340,7 @@

    Unauthorised Data Disclosure

    - + @@ -29807,7 +23349,7 @@

    Unauthorised Data Disclosure

    - + @@ -29816,7 +23358,10 @@

    Unauthorised Data Disclosure

    - + + + + @@ -29834,55 +23379,40 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Unauthorised Data Disclosure

    TermUnauthorisedDataDisclosureUnauthorisedDataAccess Prefix risk
    LabelUnauthorised Data DisclosureUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data DisclosureSomething that acts as or causes Unauthorised Data Access
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29891,7 +23421,7 @@

    Unauthorised Data Modification

    - + @@ -29900,7 +23430,7 @@

    Unauthorised Data Modification

    - + @@ -29909,7 +23439,10 @@

    Unauthorised Data Modification

    - + + + + @@ -29927,55 +23460,40 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Impersonation

    +
    +

    Unauthorised Data Modification

    TermUnauthorisedDataModificationUnauthorisedDataDisclosure Prefix risk
    LabelUnauthorised Data ModificationUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data ModificationSomething that acts as or causes Unauthorised Data Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29984,7 +23502,7 @@

    Unauthorised Impersonation

    - + @@ -29993,7 +23511,7 @@

    Unauthorised Impersonation

    - + @@ -30002,7 +23520,10 @@

    Unauthorised Impersonation

    - + + + + @@ -30043,31 +23564,17 @@

    Unauthorised Information Disclosure

    - + - - - - - - - - - + + @@ -30076,7 +23583,7 @@

    Unauthorised Information Disclosure

    - + @@ -30094,7 +23601,10 @@

    Unauthorised Information Disclosure

    - + + + + @@ -30135,31 +23645,17 @@

    Unauthorised Re-Identification

    - + - - - - - - - - - + + @@ -30168,7 +23664,7 @@

    Unauthorised Re-Identification

    - + @@ -30183,7 +23679,10 @@

    Unauthorised Re-Identification

    - + + + + @@ -30224,31 +23723,17 @@

    Unauthorised Resource Use

    - + - - - - - - - - - + + @@ -30257,7 +23742,7 @@

    Unauthorised Resource Use

    - + @@ -30275,7 +23760,10 @@

    Unauthorised Resource Use

    - + + + + @@ -30316,31 +23804,17 @@

    Unauthorised System Access

    - + - - - - - - - - - + + @@ -30349,7 +23823,7 @@

    Unauthorised System Access

    - + @@ -30367,7 +23841,10 @@

    Unauthorised System Access

    - + + + + @@ -30408,31 +23885,17 @@

    Unauthorised System Modification

    - + - - - - - - - - - + + @@ -30441,7 +23904,7 @@

    Unauthorised System Modification

    - + @@ -30459,99 +23922,10 @@

    Unauthorised System Modification

    - - - - - - - - - - - - -
    TermUnauthorisedImpersonationUnauthorisedDataModification Prefix risk
    LabelUnauthorised ImpersonationUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedImpersonationhttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised ImpersonationSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Information DisclosureSomething that acts as or causes Unauthorised Information Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Reidentification - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Re-IdentificationSomething that acts as or causes Unauthorised Re-Identification
    Date Created 2022-08-19
    Date Modified2024-08-16
    Contributors Georg P. Krog
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Resource UseSomething that acts as or causes Unauthorised Resource Use
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System AccessSomething that acts as or causes Unauthorised System Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System ModificationSomething that acts as or causes Unauthorised System Modification
    Date Created 2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Unknown Vulnerability Exploited

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + - - - - - - - - @@ -30592,31 +23966,17 @@

    Unwanted Code Deletion

    - + - - - - - - - - - + + @@ -30625,7 +23985,7 @@

    Unwanted Code Deletion

    - + @@ -30643,7 +24003,10 @@

    Unwanted Code Deletion

    - + + + + @@ -30684,31 +24047,17 @@

    Unwanted Data Deletion

    - + - - - - - - - - - - - + + + + + @@ -30717,7 +24066,7 @@

    Unwanted Data Deletion

    - + @@ -30735,7 +24084,10 @@

    Unwanted Data Deletion

    - + + + + @@ -30776,31 +24128,17 @@

    Unwanted Disclosure of Data

    - + - - - - - - - - - + + @@ -30809,7 +24147,7 @@

    Unwanted Disclosure of Data

    - + @@ -30827,7 +24165,10 @@

    Unwanted Disclosure of Data

    - + + + + @@ -30845,54 +24186,39 @@

    Unwanted Disclosure of Data

    -
    -

    Vandalism

    +
    +

    User Risks

    TermUnknownVulnerabilityExploitedPrefixrisk
    LabelUnknown Vulnerability Exploited
    IRIhttps://w3id.org/dpv/risk#UnknownVulnerabilityExploited
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnknown Vulnerability Exploited
    SourceENISA Reference Incident Classification Taxonomy 2018Date Modified2024-08-16
    Date Created2022-08-17
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Code DeletionSomething that acts as or causes Unwanted Code Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionUnwanted Data DeletionSomething that acts as or causes Unwanted Data Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Disclosure of DataSomething that acts as or causes Unwanted Disclosure of Data
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -30901,29 +24227,20 @@

    Vandalism

    - + - - - - + - - - - + - - - - + @@ -31453,54 +24770,40 @@

    Very Low Severity

    -
    -

    Violation of Code of Conduct

    +
    +

    Violating Code of Conduct

    TermVandalismUserRisks Prefix risk
    LabelVandalismUser Risks
    IRIhttps://w3id.org/dpv/risk#Vandalismhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVandalismConcepts associated with risks that arise due to User or Human use
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31509,9 +24812,12 @@

    Violation of Code of Conduct

    - + - + + + + @@ -31527,7 +24833,10 @@

    Violation of Code of Conduct

    - + + + + @@ -31545,54 +24854,40 @@

    Violation of Code of Conduct

    -
    -

    Violation of Contractual Obligations

    +
    +

    Violation of Contractual Obligation

    TermViolationCodeConductViolatingCodeOfConduct Prefix risk
    LabelViolation of Code of ConductViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#ViolationCodeConducthttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Code of ConductSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31601,9 +24896,12 @@

    Violation of Contractual Obligations

    - + - + + + + @@ -31619,7 +24917,10 @@

    Violation of Contractual Obligations

    - + + + + @@ -31637,54 +24938,40 @@

    Violation of Contractual Obligations

    -
    -

    Violation of Ethical Code

    +
    +

    Violating Ethics Code

    TermViolationContractualObligationsViolatingContractualObligation Prefix risk
    LabelViolation of Contractual ObligationsViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#ViolationContractualObligationshttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Contractual ObligationsSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31693,9 +24980,12 @@

    Violation of Ethical Code

    - + - + + + + @@ -31711,7 +25001,10 @@

    Violation of Ethical Code

    - + + + + @@ -31729,55 +25022,40 @@

    Violation of Ethical Code

    -
    -

    Violation of Rights

    +
    +

    Violation of Legal Obligations

    TermViolationEthicalCodeViolatingEthicsCode Prefix risk
    LabelViolation of Ethical CodeViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#ViolationEthicalCodehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Ethical CodeSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31786,25 +25064,34 @@

    Violation of Rights

    - + - + + + + - + + + + - + - + + + + - + @@ -31819,54 +25106,40 @@

    Violation of Rights

    -
    -

    Violation of Regulatory Obligations

    +
    +

    Violating Policy

    TermViolationOfRightsViolatingLegalObligation Prefix risk
    LabelViolation of RightsViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ViolationOfRightshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of RightsSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31875,29 +25148,20 @@

    Violation of Regulatory Obligations

    - + - - - - + - - - - + - - - - + @@ -31911,13 +25175,13 @@

    Violation of Regulatory Obligations

    -
    +

    Violation of Statutory Obligations

    TermViolationRegulatoryObligationsViolatingPolicy Prefix risk
    LabelViolation of Regulatory ObligationsViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolationRegulatoryObligationshttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Regulatory ObligationsSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + @@ -31927,38 +25191,24 @@

    Violation of Statutory Obligations

    - + - + - - - - - - - - - + + @@ -31967,9 +25217,12 @@

    Violation of Statutory Obligations

    - + - + + + + @@ -31985,7 +25238,10 @@

    Violation of Statutory Obligations

    - + + + + @@ -32002,47 +25258,40 @@

    Violation of Statutory Obligations

    -
    -

    Vulnerability

    + +
    +

    Violence against children

    TermViolationStatutoryObligationsViolatingStatutoryObligations Prefix risk
    IRIhttps://w3id.org/dpv/risk#ViolationStatutoryObligationshttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Statutory ObligationsSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + + + + - - - - - - - - - + + @@ -32051,28 +25300,40 @@

    Vulnerability

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -32080,53 +25341,45 @@

    Vulnerability

    - -
    -

    Vulnerability Created

    +
    +

    Vulnerability

    TermVulnerabilityViolenceAgainstChildren Prefix risk
    LabelVulnerabilityViolence against children
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk +
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - + - - @@ -32137,34 +25390,28 @@

    Vulnerability Created

    - + - - - - - + + - + - - - - + - @@ -32173,54 +25420,40 @@

    Vulnerability Created

    -
    -

    Vulnerability Exploited

    +
    +

    Vulnerability Created

    TermVulnerabilityCreatedVulnerability Prefix risk
    LabelVulnerability CreatedVulnerability
    IRIhttps://w3id.org/dpv/risk#VulnerabilityCreatedhttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource + risk:isExploitedBy, + risk:isVulnerabilityOf
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability
    DefinitionVulnerability CreatedIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - + + @@ -32229,7 +25462,7 @@

    Vulnerability Exploited

    - + @@ -32238,7 +25471,7 @@

    Vulnerability Exploited

    - + @@ -32247,7 +25480,10 @@

    Vulnerability Exploited

    - + + + + @@ -32378,84 +25614,6 @@

    Properties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32653,18 +25811,6 @@

    caused by vulnerability

    - - - - - - - - - - - - @@ -32693,54 +25839,6 @@

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32871,15 +25969,6 @@

    exploits vulnerability

    - - - - - - - - - @@ -33275,6 +26364,8 @@

    has vulnerability

    + + @@ -33287,15 +26378,6 @@

    has vulnerability

    - - - - - - - - - @@ -33487,72 +26569,21 @@

    is vulnerability of

    - - - - - - - - - - - - -
    TermVulnerabilityExploitedVulnerabilityCreated Prefix risk
    LabelVulnerability ExploitedVulnerability Created
    IRIhttps://w3id.org/dpv/risk#VulnerabilityExploitedhttps://w3id.org/dpv/risk#VulnerabilityCreated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:InternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVulnerability ExploitedSomething that acts as or causes Vulnerability Created
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + Date Created + 2024-02-14 + + + + + + + See More: + section CORE in RISK + + + + +
    @@ -34194,24 +27225,6 @@

    refers to risk

    - - - - - - - - - - - - - - - - - - @@ -34323,81 +27336,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34423,17 +27361,9 @@

    External

    - - - - - - - - @@ -34445,7 +27375,6 @@

    External

    - @@ -34454,17 +27383,14 @@

    External

    - - - @@ -34491,12 +27417,9 @@

    External

    - - - @@ -34510,59 +27433,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34577,10 +27447,6 @@

    External

    - - - - @@ -34589,11 +27455,6 @@

    External

    - - - - - @@ -34617,7 +27478,6 @@

    External

    - @@ -34659,26 +27519,20 @@

    External

    - - - - - - @@ -34767,46 +27621,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34815,10 +27629,6 @@

    External

    - - - - @@ -34830,10 +27640,8 @@

    External

    - - @@ -35280,28 +28088,13 @@

    External

    - - - - - - - - - - - - - - - @@ -35430,9 +28223,6 @@

    External

    - - - diff --git a/2.1-dev/risk/index.html b/2.1-dev/risk/index.html index d148174cd..c8b42bf5f 100644 --- a/2.1-dev/risk/index.html +++ b/2.1-dev/risk/index.html @@ -1024,7 +1024,7 @@

    Incident

    -

    Incident Status

    +

    Incident Status

    • risk:IncidentStatus: Status associated with an incident @@ -1074,6 +1074,10 @@

      Incident Status

    + +
    +

    Incident Report

    +
    @@ -1247,5858 +1251,923 @@

    Consequences and Impacts

    -

    The RISK extension provides a taxonomy to expand upon the [[DPV]] concepts of dpv:Consequence and dpv:Impact. In [[DPV]], consequence is in general an outcome of an event, while impacts are a specific subset of consequences which affect entities (as compared to systems and technologies). The intent of this distinction is to support regulatory requirements such as impact assessments which are focused on how processes affect entities such as individuals and societal groups.

    -

    Broadly, the taxonomy is based on the following commonly required concepts:

    -
      -
    1. Consequences: -
        -
      1. [=Benefit=]
      2. -
      3. [=Detriment=]
      4. -
      5. [=Damage=]
      6. -
    2. -
    3. Impacts: -
        -
      1. [=MaterialDamage=]
      2. -
      3. [=NonMaterialDamage=]
      4. -
      5. [=Harm=]
      6. -
      7. [=Compensation=]
      8. -
      9. [=Reward=]
      10. -
      11. [=Payment=]
      12. -
      13. [=Fee=]
      14. -
      15. [=Renumeration=]
      16. -
    4. -
    -
      -
    • - risk:Benefit: Impact(s) that acts as or causes benefits - go to full definition -
        -
      • - risk:Compensation: Compensation provided (as an impact) - go to full definition -
          -
        • - risk:Fee: Fee provided as compensation (as an impact) - go to full definition - -
        • +

          The RISK extension provides a single unified taxonomy of concepts that can take on the roles of `RiskSource`, `Risk`, `Consequence`, and `Impact` in an use-case. For example, the same concept `DataBreach` can be the the `Risk` in a risk assessment whose impacts are to be determined, or it can be the `Impact` whose causes must be discovered. By providing a single taxonomy, the adopter is free to choose which role the concept plays within their use-case - which offers significant benefits in terms of both extensibility and flexibility, allowing users to tailor the taxonomy to their specific use cases while maintaining a consistent framework.

          +

          The RISK taxonomy's design allows it to be highly and easily extensible as concepts are not required to be strictly categorised as risks or impacts within the DPV specifications itself. This is particularly valuable as the areas of cybersecurity and AI technologies are rapidly evolving landscapes where new risks and risk sources frequently emerge.

          +

          To enable the creation of this taxonomy, the concept `dpv:RiskConcept` acts as the parent or top concept, and `dpv:Risk`, `dpv:Consequence`, `dpv:Impact`, and `risk:RiskSource` are defined as its subclasses. To utilise these concepts in particular roles, the associated relations or properties such as `dpv:hasRisk` and `dpv:hasImpact` are used.

          + + +

          The risk concepts taxonomy is broadly divided into the following categories:

          + + +
          +

          InternalSecurityThreat

          +
          +
          +
          +

          UserRisks

          +
          - -
        -
      • - risk:BusinessImpact: Business impact - go to full definition + risk:HumanErrors: Something that acts as or causes Human Errors + go to full definition
      • - risk:CitizensImpact: Citizens impact - go to full definition + risk:IntentionalMisuse: Intentional Misuse + go to full definition
      • - risk:ComplianceImpact: Compliance impact - go to full definition + risk:Misuse: Something that acts as or causes Misuse + go to full definition
      • +
    +
    +
    +

    ExternalSecurityThreat

    +
    +
    +
    +

    OperationalSecurityRisk

    +
    -
  • - risk:IllegalProcessingData: Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition
  • - risk:InterceptionCommunications: Interception of Communications - go to full definition + risk:DataCorruption: Something that acts as or causes Corruption of Data + go to full definition
  • - risk:MaterialDamage: Impact that acts as or causes material damages - go to full definition - -
  • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
  • - risk:LossCompetitiveAdvantage: Loss of Competitive Advantage - go to full definition + risk:Spoofing: Something that acts as or causes Spoofing + go to full definition
  • - risk:LossControlOverData: Loss of Control over Data - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
  • - risk:LossCustomers: Loss of Customers - go to full definition + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition
  • +
    +
    +
    +

    LegalRisk

    +
    +
    +
    +

    ReputationalRisk

    +
    -
  • - risk:PublicOrderBreach: Public Order Breach - go to full definition + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition
  • - risk:UnauthorisedCodeModification: Unauthorised Code Modification - go to full definition + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition
  • - risk:UnauthorisedSystemModification: Unauthorised System Modification - go to full definition + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition
  • - risk:UnwantedCodeDeletion: Unwanted Code Deletion - go to full definition + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition
  • - risk:UnwantedDataDeletion: Unwanted Data Deletion - go to full definition + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition
  • - risk:Vandalism: Vandalism - go to full definition + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition
  • +
    +
    +
    +

    SocietalRisk

    +
    - -
  • - risk:Detriment: Impact that acts as or causes detriments - go to full definition -
  • +
    +
    +

    IndividualRisk

    +
    +
    +
    +

    EnvironmentalRisk

    +
    +
    +
    +

    FinancialImpact

    +
      +
    • + risk:Benefit: Something that acts as or causes benefits + go to full definition
    • - risk:DetrimentToRecovery: Detriment to Recovery - go to full definition + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition
    • - risk:DistributedDenialServiceAttack: Distributed Denial of Service Attack (DDoS) - go to full definition + risk:Fee: Something that acts as or provides fees e.g. for using a service + go to full definition
    • - risk:EquipmentMalfunction: Equipment Malfunction - go to full definition + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition
    • - risk:ErroneousSystemUse: Erroneous System Use - go to full definition + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
    • - risk:FinancialEquipmentCosts: Financial Equipment Costs - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
    • - risk:FinancialInvestigationCosts: Financial Investigation Costs - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
    • - risk:FinancialPersonnelCosts: Financial Personnel Costs - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition
    • - risk:FinancialRepairCosts: Financial Repair Costs - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
    • -
    • - risk:GovernmentCrisis: Government Crisis - go to full definition +
    +
    +
    + + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    + + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + - -
  • - risk:HumanErrors: Human Errors - go to full definition -
  • -
  • - risk:IdentityDispute: Identity Dispute - go to full definition -
  • -
  • - risk:IncreaseInternalCost: Increase Internal Cost - go to full definition -
  • -
  • - risk:IndustrialCrisis: Industrial Crisis - go to full definition -
  • -
  • - risk:InternalOperationDisruption: Internal Operation Disruption - go to full definition -
  • -
  • - risk:KnownVulnerabilityExploited: Known Vulnerability Exploited - go to full definition -
  • -
  • - risk:LawEnforcementAdverseEffects: Law Enforcement Adverse Effects - go to full definition -
  • -
  • - risk:LossCredibility: Loss of Credibility - go to full definition -
  • -
  • - risk:LossCustomerConfidence: Loss of Customer Confidence - go to full definition -
  • -
  • - risk:LossGoodwill: Loss of Goodwill - go to full definition -
  • -
  • - risk:LossNegotiatingCapacity: Loss of Negotiating Capacity - go to full definition -
  • -
  • - risk:LossOpportunity: Loss of Opportunity - go to full definition -
  • -
  • - risk:LossReputation: Loss of Reputation - go to full definition -
  • -
  • - risk:LossTrust: Loss of Trust - go to full definition -
  • -
  • - risk:MaliciousCodeAttack: Intentional use of software by including or inserting in a system for a harmful purpose - go to full definition -
  • -
  • - risk:MalwareAttack: Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - go to full definition -
  • -
  • - risk:MisinformationDisinformation: Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) - go to full definition - -
  • -
  • - risk:MisuseBreachedInformation: Misuse of Breached Information - go to full definition - -
  • -
  • - risk:OrganisationDisruption: Organisation Disruption - go to full definition - -
  • -
  • - risk:ReplacementCosts: Replacement Costs - go to full definition - -
  • -
  • - risk:RetrievalDeletedData: Retrieval of Deleted Data - go to full definition - -
  • -
  • - risk:RetrievalDiscardedEquipment: Retrieval of Discarded Equipment - go to full definition - -
  • -
  • - risk:ServiceInterruption: Service Interruption - go to full definition - -
  • -
  • - risk:SystemFailure: System Failure - go to full definition - -
  • -
  • - risk:SystemIntrusion: System Intrusion - go to full definition - -
  • -
  • - risk:SystemMalfunction: System Malfunction - go to full definition - -
  • -
  • - risk:ThirdPartyOperationDisruption: Third Party Operation Disruption - go to full definition - -
  • -
  • - risk:UnauthorisedAccesstoPremises: Unauthorised Access to Premises - go to full definition - -
  • -
  • - risk:UnauthorisedCodeAccess: Unauthorised Code Access - go to full definition - -
  • -
  • - risk:UnauthorisedCodeDisclosure: Unauthorised Code Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedDataAccess: Unauthorised Data Access - go to full definition - -
  • -
  • - risk:UnauthorisedDataDisclosure: Unauthorised Data Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedInformationDisclosure: Unauthorised Information Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedResourceUse: Unauthorised Resource Use - go to full definition - -
  • -
  • - risk:UnauthorisedSystemAccess: Unauthorised System Access - go to full definition - -
  • -
  • - risk:UnknownVulnerabilityExploited: Unknown Vulnerability Exploited - go to full definition - -
  • -
  • - risk:UnwantedDisclosureData: Unwanted Disclosure of Data - go to full definition - -
  • -
  • - risk:VulnerabilityCreated: Vulnerability Created - go to full definition - -
  • -
  • - risk:VulnerabilityExploited: Vulnerability Exploited - go to full definition - -
  • - - -
  • - risk:EconomicDisadvantage: Economic Disadvantage - go to full definition - -
  • -
  • - risk:HealthLifeImpact: Health and life impact - go to full definition - -
  • -
  • - risk:ImpactOnDataSubject: Impact on Data Subject - go to full definition - -
  • -
  • - risk:ImpactToRights: Impact to Rights - go to full definition - -
  • -
  • - risk:Misuse: Misuse - go to full definition - -
  • -
  • - risk:PrivacyImpact: Privacy impact - go to full definition - -
  • -
  • - risk:Reidentification: Re-identification - go to full definition - -
  • -
  • - risk:ReputationTrustImpact: Reputation and trust impact - go to full definition - -
  • -
  • - risk:SecurityBreach: Security Breach - go to full definition - -
  • -
  • - risk:SocialDisadvantage: Social Disadvantage - go to full definition - -
  • - -
    - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    - -
      -
    • - risk:RiskMatrix3x3: A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - go to full definition -
        -
      • - risk:RM3x3S1L1: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L2: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L3: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L1: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S2L2: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L3: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L1: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S3L2: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L3: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix5x5: A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - go to full definition -
        -
      • - risk:RM5x5S1L1: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L2: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L3: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L4: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S1L5: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L1: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S2L2: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L3: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L4: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L5: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L1: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S3L2: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L3: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L4: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L5: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L1: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S4L2: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S4L3: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S4L4: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L5: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L1: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S5L2: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L3: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L4: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L5: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix7x7: A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - go to full definition -
        -
      • - risk:RM7x7S1L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L1: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L2: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L3: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S2L4: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L5: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L6: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S2L7: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L1: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S3L2: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S3L3: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S3L4: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L5: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L6: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L7: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L1: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition - -
      • -
      • - risk:RM7x7S4L2: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S4L3: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S4L4: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L5: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L6: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L7: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L1: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S5L2: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S5L3: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S5L4: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S5L5: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L6: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S5L7: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L1: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S6L2: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S6L3: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S6L4: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L5: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L6: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L7: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S7L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S7L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S7L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S7L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      -
    • -
    - -
    - - -
    -

    Vocabulary Index

    -
    -

    Classes

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    Abusive Content Utilisation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAbusiveContentUtilisationPrefixrisk
    LabelAbusive Content Utilisation
    IRIhttps://w3id.org/dpv/risk#AbusiveContentUtilisation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAbusive Content Utilisation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Accidental Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Attack on Private Life

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAttackonPrivateLifePrefixrisk
    LabelAttack on Private Life
    IRIhttps://w3id.org/dpv/risk#AttackonPrivateLife
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAttack on Private Life
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Authorisation Failure

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAuthorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Availability Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Avoid Source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Benefit

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionImpact(s) that acts as or causes benefits
    Date Created2022-03-23
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Blackmail

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBlackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Brute Force Authorisations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBrute Force Authorisations
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business disruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessdisruptionPrefixrisk
    LabelBusiness disruption
    IRIhttps://w3id.org/dpv/risk#Businessdisruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness disruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessImpactPrefixrisk
    LabelBusiness impact
    IRIhttps://w3id.org/dpv/risk#BusinessImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business Performance Impairment

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessPerformanceImpairmentPrefixrisk
    LabelBusiness Performance Impairment
    IRIhttps://w3id.org/dpv/risk#BusinessPerformanceImpairment
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness Performance Impairment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - - - -
    -

    Change Consequence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Change Impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Child Violence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChildViolencePrefixrisk
    LabelChild Violence
    IRIhttps://w3id.org/dpv/risk#ChildViolence
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionChild Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Citizens impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCitizensImpactPrefixrisk
    LabelCitizens impact
    IRIhttps://w3id.org/dpv/risk#CitizensImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCitizens impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Coercion

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCoercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compensation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types risk:Benefit - → dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionCompensation provided (as an impact)
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compliance impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermComplianceImpactPrefixrisk
    LabelCompliance impact
    IRIhttps://w3id.org/dpv/risk#ComplianceImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompliance impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Credentials

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Credentials
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountSecurityPrefixrisk
    LabelCompromise Account Security
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Security
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Confidentiality Breach

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConfidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Confidentiality Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Consequence Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Consequence for Data Subject

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceForDataSubjectPrefixrisk
    LabelConsequence for Data Subject
    IRIhttps://w3id.org/dpv/risk#ConsequenceForDataSubject
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence for Data Subject
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Consequence on Data Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceOnDataSecurityPrefixrisk
    LabelConsequence on Data Security
    IRIhttps://w3id.org/dpv/risk#ConsequenceOnDataSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence on Data Security
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Containment Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Copyright Violation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCopyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - -
    -

    Corruption of Data

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCorruptionDataPrefixrisk
    LabelCorruption of Data
    IRIhttps://w3id.org/dpv/risk#CorruptionData
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCorruption of Data
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Acquisition

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostAcquisitionPrefixrisk
    LabelCost of Acquisition
    IRIhttps://w3id.org/dpv/risk#CostAcquisition
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Acquisition
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Backup

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostBackupPrefixrisk
    LabelCost of Backup
    IRIhttps://w3id.org/dpv/risk#CostBackup
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Backup
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Configuration

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostConfigurationPrefixrisk
    LabelCost of Configuration
    IRIhttps://w3id.org/dpv/risk#CostConfiguration
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Configuration
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Installation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostInstallationPrefixrisk
    LabelCost of Installation
    IRIhttps://w3id.org/dpv/risk#CostInstallation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Installation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Penalties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialPenaltiesPrefixrisk
    LabelCost of Judicial Penalties
    IRIhttps://w3id.org/dpv/risk#CostJudicialPenalties
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Penalties
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Proceedings

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialProceedingsPrefixrisk
    LabelCost of Judicial Proceedings
    IRIhttps://w3id.org/dpv/risk#CostJudicialProceedings
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Proceedings
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Operation Interruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostOperationInterruptionPrefixrisk
    LabelCost of Operation Interruption
    IRIhttps://w3id.org/dpv/risk#CostOperationInterruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Operation Interruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Suspended Operations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostSuspendedOperationsPrefixrisk
    LabelCost of Suspended Operations
    IRIhttps://w3id.org/dpv/risk#CostSuspendedOperations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Suspended Operations
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Cross-Border Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Cryptojacking

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCryptojackingPrefixrisk
    LabelCryptojacking
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Spying

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCyberSpyingPrefixrisk
    LabelCyber Spying
    IRIhttps://w3id.org/dpv/risk#CyberSpying
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCyber Spying
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Stalking

    + + + + + +
    +

    3 Likelihood Levels

    - + - + - + - + - - - - - + - @@ -7109,23 +2178,20 @@

    Cyber Stalking

    - + - - - - + - + @@ -7136,7 +2202,7 @@

    Cyber Stalking

    - @@ -7145,51 +2211,41 @@

    Cyber Stalking

    -
    -

    Damage

    +
    +

    3 Risk Levels

    TermCyberStalking3LikelihoodLevels Prefix risk
    LabelCyber Stalking3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#CyberStalkinghttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionCyber StalkingScale with 3 Likelihood Levels from High to Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7200,7 +2256,7 @@

    Damage

    - + @@ -7213,7 +2269,7 @@

    Damage

    - + @@ -7224,7 +2280,7 @@

    Damage

    - @@ -7233,52 +2289,41 @@

    Damage

    -
    -

    Damage by Third Party

    +
    +

    3 Severity Levels

    TermDamage3RiskLevels Prefix risk
    LabelDamage3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes damagesScale with 3 Risk Levels from High to Low
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7289,23 +2334,20 @@

    Damage by Third Party

    - + - - - - + - + @@ -7316,7 +2358,7 @@

    Damage by Third Party

    - @@ -7325,53 +2367,41 @@

    Damage by Third Party

    -
    -

    Danger to Customers

    +
    +

    5 Likelihood Levels

    TermDamageByThirdParty3SeverityLevels Prefix risk
    LabelDamage by Third Party3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DamageByThirdPartyhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionDamage by Third PartyScale with 3 Severity Levels from High to Low
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7382,23 +2412,20 @@

    Danger to Customers

    - + - - - - + - + @@ -7409,7 +2436,7 @@

    Danger to Customers

    - @@ -7418,53 +2445,41 @@

    Danger to Customers

    -
    -

    Danger to Personnel

    +
    +

    5 Risk Levels

    TermDangertoCustomers5LikelihoodLevels Prefix risk
    LabelDanger to Customers5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DangertoCustomershttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionDanger to CustomersScale with 5 Likelihood Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7475,23 +2490,20 @@

    Danger to Personnel

    - + - - - - + - + @@ -7502,7 +2514,7 @@

    Danger to Personnel

    - @@ -7511,52 +2523,41 @@

    Danger to Personnel

    -
    -

    Data Breach

    +
    +

    5 Severity Levels

    TermDangertoPersonnel5RiskLevels Prefix risk
    LabelDanger to Personnel5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DangertoPersonnelhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDanger to PersonnelScale with 5 Risk Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7567,26 +2568,20 @@

    Data Breach

    - + - - - - - - - + - + @@ -7597,7 +2592,7 @@

    Data Breach

    - @@ -7605,41 +2600,42 @@

    Data Breach

    -
    -

    Deliberate Incident

    + +
    +

    7 Likelihood Levels

    TermDataBreach5SeverityLevels Prefix risk
    LabelData Breach5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionData BreachScale with 5 Severity Levels from Very High to Very Low
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7650,7 +2646,7 @@

    Deliberate Incident

    - + @@ -7663,15 +2659,18 @@

    Deliberate Incident

    - + - + + + + - @@ -7680,52 +2679,41 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    7 Risk Levels

    TermDeliberateIncident7LikelihoodLevels Prefix risk
    LabelDeliberate Incident7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident + dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to deliberate actions of a humanScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7736,23 +2724,20 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + @@ -7763,7 +2748,7 @@

    Denial of Service Attack (DoS)

    - @@ -7772,45 +2757,41 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    +
    +

    7 Severity Levels

    TermDenialServiceAttack7RiskLevels Prefix risk
    LabelDenial of Service Attack (DoS)7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDenial of Service Attack (DoS)Scale with 7 Risk Levels from Extremely High to Extremely Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7821,7 +2802,7 @@

    Detection Control

    - + @@ -7834,15 +2815,18 @@

    Detection Control

    - + - + + + + - @@ -7850,52 +2834,42 @@

    Detection Control

    - -
    -

    Detriment

    +
    +

    Accidental Incident

    TermDetectionControl7SeverityLevels Prefix risk
    LabelDetection Control7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to detect eventScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7906,7 +2880,7 @@

    Detriment

    - + @@ -7919,18 +2893,15 @@

    Detriment

    - + - - - - + - @@ -7939,54 +2910,40 @@

    Detriment

    -
    -

    Detriment to Recovery

    +
    +

    Accidental Misuse

    TermDetrimentAccidentalIncident Prefix risk
    LabelDetrimentAccidental Incident
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes detrimentsIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2022-03-232024-05-19
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -7995,29 +2952,20 @@

    Detriment to Recovery

    - + - - - - + - - - - + - - - - + @@ -8031,55 +2979,40 @@

    Detriment to Recovery

    -
    -

    Discrimination

    +
    +

    Authorisation Failure

    TermDetrimentToRecoveryAccidentalMisuse Prefix risk
    LabelDetriment to RecoveryAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#DetrimentToRecoveryhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDetriment to RecoveryAccidental Misuse
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8088,25 +3021,31 @@

    Discrimination

    - + - + + + + - + - + + + + - + @@ -8121,85 +3060,61 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    None

    TermDiscriminationAuthorisationFailure Prefix risk
    LabelDiscriminationAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDiscriminationSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -8212,54 +3127,42 @@

    Distributed Denial of Service Attack (DDoS)

    - -
    -

    Eavesdropping

    +
    +

    Availability Incident

    TermDistributedDenialServiceAttackAvailabilityBreach Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)None
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDistributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8270,34 +3173,28 @@

    Eavesdropping

    - + - - - - + - + - - - - + - @@ -8306,51 +3203,46 @@

    Eavesdropping

    -
    -

    Economic Disadvantage

    +
    +

    Avoid Source

    TermEavesdroppingAvailabilityIncident Prefix risk
    LabelEavesdroppingAvailability Incident
    IRIhttps://w3id.org/dpv/risk#Eavesdroppinghttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionEavesdroppingIncident where the availability of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -8361,7 +3253,7 @@

    Economic Disadvantage

    - + @@ -8374,18 +3266,18 @@

    Economic Disadvantage

    - + - + - @@ -8393,43 +3285,41 @@

    Economic Disadvantage

    -
    -

    Environmental Incident

    + +
    +

    Benefit

    TermEconomicDisadvantageAvoidSource Prefix risk
    LabelEconomic DisadvantageAvoid Source
    IRIhttps://w3id.org/dpv/risk#EconomicDisadvantagehttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEconomic DisadvantageControl that avoids the risk source
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -8438,7 +3328,7 @@

    Environmental Incident

    - + @@ -8451,15 +3341,21 @@

    Environmental Incident

    - + - - + + + + + + + + - @@ -8468,55 +3364,40 @@

    Environmental Incident

    -
    -

    Environmental Safety Endangerment

    +
    +

    Blackmail

    TermEnvironmentalIncidentBenefit Prefix risk
    LabelEnvironmental IncidentBenefit
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Incident + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to environmental factors outside human controlsSomething that acts as or causes benefits
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8525,7 +3406,7 @@

    Environmental Safety Endangerment

    - + @@ -8543,7 +3424,10 @@

    Environmental Safety Endangerment

    - + + + + @@ -8561,54 +3445,40 @@

    Environmental Safety Endangerment

    -
    -

    Equipment Failure

    +
    +

    Brute Force Authorisations

    TermEnvironmentalSafetyEndangermentBlackmail Prefix risk
    LabelEnvironmental Safety EndangermentBlackmail
    IRIhttps://w3id.org/dpv/risk#EnvironmentalSafetyEndangermenthttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEnvironmental Safety EndangermentSomething that acts as or causes Blackmail
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8617,7 +3487,7 @@

    Equipment Failure

    - + @@ -8626,7 +3496,7 @@

    Equipment Failure

    - + @@ -8635,7 +3505,10 @@

    Equipment Failure

    - + + + + @@ -8653,52 +3526,50 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    + + + + +
    +

    Change Consequence

    TermEquipmentFailureBruteForceAuthorisations Prefix risk
    LabelEquipment FailureBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEquipment FailureSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8709,23 +3580,20 @@

    Equipment Malfunction

    - + - - - - + - + @@ -8736,7 +3604,7 @@

    Equipment Malfunction

    - @@ -8745,52 +3613,46 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Change Impact

    TermEquipmentMalfunctionChangeConsequence Prefix risk
    LabelEquipment MalfunctionChange Consequence
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEquipment MalfunctionControl that changes Consequence
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -8801,23 +3663,20 @@

    Erroneous System Use

    - + - - - - + - + @@ -8828,7 +3687,7 @@

    Erroneous System Use

    - @@ -8837,57 +3696,40 @@

    Erroneous System Use

    - - -
    -

    Extorsion

    +
    +

    Coercion

    TermErroneousSystemUseChangeImpact Prefix risk
    LabelErroneous System UseChange Impact
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionErroneous System UseControl that changes Impact
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8896,7 +3738,7 @@

    Extorsion

    - + @@ -8914,7 +3756,10 @@

    Extorsion

    - + + + + @@ -8932,44 +3777,40 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Compensation

    TermExtorsionCoercion Prefix risk
    LabelExtorsionCoercion
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionExtorsionSomething that acts as or causes Coercion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8978,12 +3819,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -8994,18 +3832,21 @@

    Extremely High Likelihood

    - + - + + + + - + - @@ -9014,44 +3855,40 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    +
    +

    Component Failure

    TermExtremelyHighLikelihoodCompensation Prefix risk
    LabelExtremely High LikelihoodCompensation
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely HighSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9060,11 +3897,11 @@

    Extremely High Risk

    - + - + @@ -9074,20 +3911,14 @@

    Extremely High Risk

    - - - - + - - - - + - @@ -9096,44 +3927,40 @@

    Extremely High Risk

    -
    -

    Extremely High Severity

    +
    +

    Component Malfunction

    TermExtremelyHighRiskComponentFailure Prefix risk
    LabelExtremely High RiskComponent Failure
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Component Failure
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + @@ -9142,11 +3969,11 @@

    Extremely High Severity

    - + - + @@ -9156,20 +3983,14 @@

    Extremely High Severity

    - - - - + - - - - + - @@ -9178,44 +3999,40 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Compromise Account

    TermExtremelyHighSeverityComponentMalfunction Prefix risk
    LabelExtremely High SeverityComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Component Malfunction
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9224,25 +4041,28 @@

    Extremely Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -9251,7 +4071,7 @@

    Extremely Low Likelihood

    - @@ -9260,44 +4080,40 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Compromise Account Credentials

    TermExtremelyLowLikelihoodCompromiseAccount Prefix risk
    LabelExtremely Low LikelihoodCompromise Account
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowSomething that acts as or causes a compromised account that is then used by the compromiser
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9306,25 +4122,28 @@

    Extremely Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -9333,7 +4152,7 @@

    Extremely Low Risk

    - @@ -9342,44 +4161,42 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    +
    +

    Confidentiality Breach

    TermExtremelyLowRiskCompromiseAccountCredentials Prefix risk
    LabelExtremely Low RiskCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowSomething that acts as or causes Account Credentials to be compromised
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9388,25 +4205,28 @@

    Extremely Low Severity

    - + - - - - + - + + + + - + - + + + + @@ -9415,7 +4235,7 @@

    Extremely Low Severity

    - @@ -9423,50 +4243,42 @@

    Extremely Low Severity

    - -
    -

    Fee

    +
    +

    Confidentiality Incident

    TermExtremelyLowSeverityConfidentialityBreach Prefix risk
    LabelExtremely Low SeverityConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Confidentiality Breach
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -9477,34 +4289,28 @@

    Fee

    - + - - - - + - + - - - - + - @@ -9513,52 +4319,45 @@

    Fee

    -
    -

    Financial Equipment Costs

    +
    +

    Consequence Control

    TermFeeConfidentialityIncident Prefix risk
    LabelFeeConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + risk:hasIncident
    DefinitionFee provided as compensation (as an impact)Incident where the confidentiality of information or system has been affected
    Source
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -9569,23 +4368,20 @@

    Financial Equipment Costs

    - + - - - - + - + @@ -9596,7 +4392,7 @@

    Financial Equipment Costs

    - @@ -9605,52 +4401,45 @@

    Financial Equipment Costs

    -
    -

    Financial Investigation Costs

    +
    +

    Containment Control

    TermFinancialEquipmentCostsConsequenceControl Prefix risk
    LabelFinancial Equipment CostsConsequence Control
    IRIhttps://w3id.org/dpv/risk#FinancialEquipmentCostshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Equipment CostsRisk Mitigation Measure that controls the Consequences
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -9661,34 +4450,28 @@

    Financial Investigation Costs

    - + - - - - + - + - - - - + - @@ -9697,54 +4480,40 @@

    Financial Investigation Costs

    -
    -

    Financial Loss

    +
    +

    Copyright Violation

    TermFinancialInvestigationCostsContainmentControl Prefix risk
    LabelFinancial Investigation CostsContainment Control
    IRIhttps://w3id.org/dpv/risk#FinancialInvestigationCostshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Investigation CostsControl to contain event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9753,7 +4522,7 @@

    Financial Loss

    - + @@ -9762,7 +4531,7 @@

    Financial Loss

    - + @@ -9771,7 +4540,10 @@

    Financial Loss

    - + + + + @@ -9786,55 +4558,46 @@

    Financial Loss

    TermFinancialLossCopyrightViolation Prefix risk
    LabelFinancial LossCopyright Violation
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial LossSomething that acts as or causes Copyright Violation
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    + + - -
    -

    Financial Personnel Costs

    +
    +

    Cross-Border Incident

    - + - + - + - + - - - - - + - @@ -9845,34 +4608,28 @@

    Financial Personnel Costs

    - + - - - - + - + - - - - + - @@ -9881,54 +4638,40 @@

    Financial Personnel Costs

    -
    -

    Financial Repair Costs

    +
    +

    Cryptojacking

    TermFinancialPersonnelCostsCrossBorderIncident Prefix risk
    LabelFinancial Personnel CostsCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#FinancialPersonnelCostshttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionFinancial Personnel CostsIncident involving cross-border or multiple jurisdictions
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9937,7 +4680,7 @@

    Financial Repair Costs

    - + @@ -9946,7 +4689,7 @@

    Financial Repair Costs

    - + @@ -9955,7 +4698,10 @@

    Financial Repair Costs

    - + + + + @@ -9973,55 +4719,40 @@

    Financial Repair Costs

    -
    -

    Fraud

    +
    +

    Damage

    TermFinancialRepairCostsCryptojacking Prefix risk
    LabelFinancial Repair CostsCryptojacking
    IRIhttps://w3id.org/dpv/risk#FinancialRepairCostshttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial Repair CostsSomething that acts as or causes Cryptojacking
    SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10030,25 +4761,25 @@

    Fraud

    - + - - - - + - + - + + + + @@ -10066,54 +4797,41 @@

    Fraud

    -
    -

    Government Crisis

    +
    +

    Data Breach

    TermFraudDamage Prefix risk
    LabelFraudDamage
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFraudSomething that acts as or causes Damage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10122,10 +4840,13 @@

    Government Crisis

    - + + + + @@ -10140,7 +4861,10 @@

    Government Crisis

    - + + + + @@ -10149,7 +4873,7 @@

    Government Crisis

    - @@ -10158,48 +4882,40 @@

    Government Crisis

    -
    -

    Halt Source

    +
    +

    Data Corruption

    TermGovernmentCrisisDataBreach Prefix risk
    LabelGovernment CrisisData Breach
    IRIhttps://w3id.org/dpv/risk#GovernmentCrisishttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionGovernment CrisisSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
    - + - + - + - + - - - - - + @@ -10208,22 +4924,31 @@

    Halt Source

    - + - + + + + - + + + + - + - + + + + @@ -10232,7 +4957,7 @@

    Halt Source

    - @@ -10240,53 +4965,42 @@

    Halt Source

    - -
    -

    Harm

    +
    +

    Deliberate Incident

    TermHaltSourceDataCorruption Prefix risk
    LabelHalt SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10297,7 +5011,7 @@

    Harm

    - + @@ -10310,18 +5024,15 @@

    Harm

    - + - - - - + - @@ -10330,55 +5041,40 @@

    Harm

    -
    -

    Harmful Speech

    +
    +

    Denial of Service Attack (DoS)

    TermHarmDeliberateIncident Prefix risk
    LabelHarmDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes harmsIncident caused due to deliberate actions of a human
    Date Created2022-08-132024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -10387,7 +5083,7 @@

    Harmful Speech

    - + @@ -10396,7 +5092,7 @@

    Harmful Speech

    - + @@ -10405,7 +5101,10 @@

    Harmful Speech

    - + + + + @@ -10423,61 +5122,45 @@

    Harmful Speech

    - - - - - - - - - - -
    -

    Health and life impact

    +
    +

    Detection Control

    TermHarmfulSpeechDenialServiceAttack Prefix risk
    LabelHarmful SpeechDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#HarmfulSpeechhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionHarmful SpeechSomething that acts as or causes Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -10488,34 +5171,28 @@

    Health and life impact

    - + - - - - + - + - - - - + - @@ -10524,52 +5201,40 @@

    Health and life impact

    -
    -

    High Likelihood

    +
    +

    Detriment

    TermHealthLifeImpactDetectionControl Prefix risk
    LabelHealth and life impactDetection Control
    IRIhttps://w3id.org/dpv/risk#HealthLifeImpacthttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionHealth and life impactControl to detect event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -10578,12 +5243,9 @@

    High Likelihood

    - + - - - - + @@ -10594,18 +5256,21 @@

    High Likelihood

    - + - + + + + - + - @@ -10614,52 +5279,40 @@

    High Likelihood

    -
    -

    High Risk

    +
    +

    Discrimination

    TermHighLikelihoodDetriment Prefix risk
    LabelHigh LikelihoodDetriment
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is HighSomething that acts as or causes Detriment
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10668,12 +5321,9 @@

    High Risk

    - + - - - - + @@ -10684,18 +5334,21 @@

    High Risk

    - + - + + + + - + - @@ -10704,52 +5357,40 @@

    High Risk

    -
    -

    High Severity

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermHighRiskDiscrimination Prefix risk
    LabelHigh RiskDiscrimination
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighSomething that acts as or causes Discrimination
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10758,25 +5399,28 @@

    High Severity

    - + - - - - + - + + + + - + - + + + + @@ -10785,7 +5429,7 @@

    High Severity

    - @@ -10793,53 +5437,42 @@

    High Severity

    - -
    -

    Human Errors

    +
    +

    Environmental Incident

    TermHighSeverityDistributedDenialServiceAttack Prefix risk
    LabelHigh SeverityDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is HighSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10850,34 +5483,28 @@

    Human Errors

    - + - - - - + - + - - - - + - @@ -10886,47 +5513,39 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Environmental Risk

    TermHumanErrorsEnvironmentalIncident Prefix risk
    LabelHuman ErrorsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionHuman ErrorsIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -10935,7 +5554,7 @@

    Identification Control

    - + @@ -10946,17 +5565,14 @@

    Identification Control

    - - - - + - @@ -10965,54 +5581,40 @@

    Identification Control

    -
    -

    Identity Dispute

    +
    +

    Equipment Failure

    TermIdentificationControlEnvironmentalRisk Prefix risk
    LabelIdentification ControlEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11021,22 +5623,31 @@

    Identity Dispute

    - + - + + + + - + + + + - + - + + + + @@ -11054,55 +5665,40 @@

    Identity Dispute

    -
    -

    Identity Fraud

    +
    +

    Equipment Malfunction

    TermIdentityDisputeEquipmentFailure Prefix risk
    LabelIdentity DisputeEquipment Failure
    IRIhttps://w3id.org/dpv/risk#IdentityDisputehttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity DisputeSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-242022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11111,16 +5707,19 @@

    Identity Fraud

    - + - + + + + - + @@ -11129,7 +5728,10 @@

    Identity Fraud

    - + + + + @@ -11147,55 +5749,40 @@

    Identity Fraud

    -
    -

    Identity Theft

    +
    +

    Erroneous System Use

    TermIdentityFraudEquipmentMalfunction Prefix risk
    LabelIdentity FraudEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity FraudSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11204,7 +5791,7 @@

    Identity Theft

    - + @@ -11213,7 +5800,7 @@

    Identity Theft

    - + @@ -11222,7 +5809,10 @@

    Identity Theft

    - + + + + @@ -11240,54 +5830,42 @@

    Identity Theft

    -
    -

    Illegal Processing of Data

    + + +
    +

    Exposure to Harmful Speech

    TermIdentityTheftErroneousSystemUse Prefix risk
    LabelIdentity TheftErroneous System Use
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity TheftSomething that acts as or causes Erroneous System Use
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11296,16 +5874,19 @@

    Illegal Processing of Data

    - + - + + + + - + @@ -11314,7 +5895,10 @@

    Illegal Processing of Data

    - + + + + @@ -11332,47 +5916,39 @@

    Illegal Processing of Data

    -
    -

    Impact Control

    +
    +

    External Security Threat

    TermIllegalProcessingDataExposureToHarmfulSpeech Prefix risk
    LabelIllegal Processing of DataExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#IllegalProcessingDatahttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIllegal Processing of DataSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -11381,7 +5957,7 @@

    Impact Control

    - + @@ -11392,20 +5968,14 @@

    Impact Control

    - - - - + - - - - + - @@ -11414,53 +5984,40 @@

    Impact Control

    -
    -

    Impact on Data Subject

    +
    +

    Extorsion

    TermImpactControlExternalSecurityThreat Prefix risk
    LabelImpact ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11469,25 +6026,31 @@

    Impact on Data Subject

    - + - + + + + - + - + + + + - + @@ -11502,51 +6065,42 @@

    Impact on Data Subject

    -
    -

    Impact to Rights

    +
    +

    Extremely High Likelihood

    TermImpactOnDataSubjectExtorsion Prefix risk
    LabelImpact on Data SubjectExtorsion
    IRIhttps://w3id.org/dpv/risk#ImpactOnDataSubjecthttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact on Data SubjectSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-10-222022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Georg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -11557,23 +6111,23 @@

    Impact to Rights

    - + - + + + + - - - - + - + @@ -11584,7 +6138,7 @@

    Impact to Rights

    - @@ -11592,38 +6146,43 @@

    Impact to Rights

    -
    -

    Incident

    + +
    +

    Extremely High Risk

    TermImpactToRightsExtremelyHighLikelihood Prefix risk
    LabelImpact to RightsExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#ImpactToRightshttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Risk + risk:7LikelihoodLevels + → dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionImpact to RightsLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + - @@ -11634,16 +6193,13 @@

    Incident

    - + - + - - - @@ -11653,68 +6209,62 @@

    Incident

    - + - + -
    TermIncidentExtremelyHighRisk Prefix risk
    LabelIncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionAn actual or occured eventLevel where Risk is Extremely High
    Usage NoteIncident is realised or materialised riskThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-05-192022-08-18
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-LEVELS in RISK
    - - -
    -

    Incident Assessment Report

    + +
    +

    Extremely High Severity

    - + - + - + - + - - @@ -11725,9 +6275,12 @@

    Incident Assessment Report

    - + - + + + + @@ -11738,15 +6291,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -11755,44 +6311,42 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Extremely Low Likelihood

    TermIncidentAssessmentReportExtremelyHighSeverity Prefix risk
    LabelIncident Assessment ReportExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11803,9 +6357,12 @@

    Incident Concluded

    - + - + + + + @@ -11816,7 +6373,7 @@

    Incident Concluded

    - + @@ -11827,7 +6384,7 @@

    Incident Concluded

    - @@ -11835,46 +6392,43 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Extremely Low Risk

    TermIncidentConcludedExtremelyLowLikelihood Prefix risk
    LabelIncident ConcludedExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11885,9 +6439,12 @@

    Incident Concluding Report

    - + - + + + + @@ -11898,15 +6455,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -11914,46 +6474,43 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + +
    +

    Extremely Low Severity

    TermIncidentConcludingReportExtremelyLowRisk Prefix risk
    LabelIncident Concluding ReportExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11964,9 +6521,12 @@

    Incident Detection Report

    - + - + + + + @@ -11977,15 +6537,18 @@

    Incident Detection Report

    - + - + + + + - @@ -11994,46 +6557,40 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Fee

    TermIncidentDetectionReportExtremelyLowSeverity Prefix risk
    LabelIncident Detection ReportExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the detection of a IncidentLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12042,31 +6599,37 @@

    Incident Halted

    - + - + + + + - + - + + + + - + - @@ -12074,48 +6637,40 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Financial Impact

    TermIncidentHaltedFee Prefix risk
    LabelIncident HaltedFee
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#Fee
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or provides fees e.g. for using a service
    Source
    Date Created2024-02-142024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12124,7 +6679,7 @@

    Incident Handling Report

    - + @@ -12135,17 +6690,14 @@

    Incident Handling Report

    - - - - + - @@ -12153,33 +6705,38 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Financial Loss

    TermIncidentHandlingReportFinancialImpact Prefix risk
    LabelIncident Handling ReportFinancial Impact
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceThings that cause or have the potential to impact financial resources
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -12191,28 +6748,37 @@

    Incident Identifier

    - + - + + + + - + - - + + + + + + + + - @@ -12220,51 +6786,41 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Fraud

    TermIncidentIdentifierFinancialLoss Prefix risk
    LabelIncident IdentifierFinancial Loss
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incidentSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12273,22 +6829,28 @@

    Incident Impact Assessment

    - + - + + + + - + - + + + + @@ -12297,7 +6859,7 @@

    Incident Impact Assessment

    - @@ -12306,44 +6868,46 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    +
    +

    Halt Source

    TermIncidentImpactAssessmentFraud Prefix risk
    LabelIncident Impact AssessmentFraud
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentSomething that acts as or causes Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12354,7 +6918,7 @@

    Incident Mitigated

    - + @@ -12367,7 +6931,7 @@

    Incident Mitigated

    - + @@ -12378,7 +6942,7 @@

    Incident Mitigated

    - @@ -12386,45 +6950,40 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + +
    +

    Harm

    TermIncidentMitigatedHaltSource Prefix risk
    LabelIncident MitigatedHalt Source
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringControl that halts the risk source or prevents it from materialising
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12433,9 +6992,12 @@

    Incident Mitigation Measure

    - + - + + + + @@ -12446,15 +7008,21 @@

    Incident Mitigation Measure

    - + - - + + + + + + + + - @@ -12463,44 +7031,60 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + + + + + + +
    +

    High Likelihood

    TermIncidentMitigationMeasureHarm Prefix risk
    LabelIncident Mitigation MeasureHarm
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2024-05-192022-08-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -12511,9 +7095,12 @@

    Incident Near Miss

    - + - + + + + @@ -12524,7 +7111,7 @@

    Incident Near Miss

    - + @@ -12535,7 +7122,7 @@

    Incident Near Miss

    - @@ -12543,45 +7130,51 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + +
    +

    High Risk

    TermIncidentNearMissHighLikelihood Prefix risk
    LabelIncident Near MissHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Level where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12592,9 +7185,12 @@

    Incident Notice

    - + - + + + + @@ -12605,15 +7201,18 @@

    Incident Notice

    - + - + + + + - @@ -12622,44 +7221,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    +
    +

    High Severity

    TermIncidentNoticeHighRisk Prefix risk
    LabelIncident NoticeHigh Risk
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionNotice associated with an IncidentLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12670,9 +7275,12 @@

    Incident Ongoing

    - + - + + + + @@ -12683,7 +7291,7 @@

    Incident Ongoing

    - + @@ -12694,7 +7302,7 @@

    Incident Ongoing

    - @@ -12702,48 +7310,41 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + +
    +

    Human Errors

    TermIncidentOngoingHighSeverity Prefix risk
    LabelIncident OngoingHigh Severity
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionThe incident is ongoing i.e. still activeLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12752,28 +7353,37 @@

    Incident Ongoing Report

    - + - + + + + - + - - + + + + + + + + - @@ -12781,46 +7391,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + +
    +

    Identification Control

    TermIncidentOngoingReportHumanErrors Prefix risk
    LabelIncident Ongoing ReportHuman Errors
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12831,7 +7441,7 @@

    Incident Preliminary Report

    - + @@ -12852,7 +7462,7 @@

    Incident Preliminary Report

    - @@ -12860,47 +7470,41 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Identity Fraud

    TermIncidentPreliminaryReportIdentificationControl Prefix risk
    LabelIncident Preliminary ReportIdentification Control
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12909,22 +7513,28 @@

    Incident Register

    - + - + + + + - + - + + + + @@ -12933,7 +7543,7 @@

    Incident Register

    - @@ -12941,47 +7551,41 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Identity Theft

    TermIncidentRegisterIdentityFraud Prefix risk
    LabelIncident RegisterIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + + @@ -12990,28 +7594,37 @@

    Incident Report

    - + - + + + + - + - - + + + + + + + + - @@ -13019,45 +7632,41 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Illegal Data Processing

    TermIncidentReportIdentityTheft Prefix risk
    LabelIncident ReportIdentity Theft
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -13066,25 +7675,31 @@

    Incident Status

    - + + + + + - - - - - + + + + - + - + + + + @@ -13093,7 +7708,7 @@

    Incident Status

    - @@ -13102,44 +7717,45 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Impact Control

    TermIncidentStatusIllegalDataProcessing Prefix risk
    LabelIncident StatusIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Status - → dpv:Context + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -13150,7 +7766,7 @@

    Incident Status Unknown

    - + @@ -13163,7 +7779,7 @@

    Incident Status Unknown

    - + @@ -13174,7 +7790,7 @@

    Incident Status Unknown

    - @@ -13182,45 +7798,41 @@

    Incident Status Unknown

    - -
    -

    Incident Suspected

    +
    +

    Incident

    TermIncidentStatusUnknownImpactControl Prefix risk
    LabelIncident Status UnknownImpact Control
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownRisk Mitigation Measure that controls Impacts
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -13231,10 +7843,16 @@

    Incident Suspected

    - + + + + + - + + + @@ -13246,40 +7864,46 @@

    Incident Suspected

    - + + + + - + -
    TermIncidentSuspectedIncident Prefix risk
    LabelIncident SuspectedIncident
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section INCIDENT-STATUS in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + -
    -

    Incident Suspected Report

    +
    +

    Incident Assessment Report

    - + - + - + @@ -13313,7 +7937,7 @@

    Incident Suspected Report

    - + @@ -13343,23 +7967,23 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Incident Concluded

    TermIncidentSuspectedReportIncidentAssessmentReport Prefix risk
    LabelIncident Suspected ReportIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#IncidentAssessmentReport
    DefinitionA report describing the suspicion of an incident in the past or occuringA report describing the assessment of an incident in terms of its effects or impacts
    - + - + - + @@ -13391,7 +8015,7 @@

    Incident Terminated

    - + @@ -13423,53 +8047,46 @@

    Incident Terminated

    - -
    -

    Increase Internal Cost

    +
    +

    Incident Concluding Report

    TermIncidentTerminatedIncidentConcluded Prefix risk
    LabelIncident TerminatedIncident Concluded
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#IncidentConcluded
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + - @@ -13480,34 +8097,28 @@

    Increase Internal Cost

    - + - - - - + - + - - - - + - @@ -13515,53 +8126,46 @@

    Increase Internal Cost

    - -
    -

    Industrial Crisis

    +
    +

    Incident Detection Report

    TermIncreaseInternalCostIncidentConcludingReport Prefix risk
    LabelIncrease Internal CostIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#IncreaseInternalCosthttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncrease Internal CostA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13572,34 +8176,28 @@

    Industrial Crisis

    - + - - - - + - + - - - - + - @@ -13608,53 +8206,44 @@

    Industrial Crisis

    -
    -

    Injury

    +
    +

    Incident Halted

    TermIndustrialCrisisIncidentDetectionReport Prefix risk
    LabelIndustrial CrisisIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#IndustrialCrisishttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIndustrial CrisisA report describing the detection of a Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13665,23 +8254,20 @@

    Injury

    - + - - - - + - + @@ -13692,7 +8278,7 @@

    Injury

    - @@ -13700,23 +8286,23 @@

    Injury

    -
    -

    Integrity Incident

    +
    +

    Incident Handling Report

    TermInjuryIncidentHalted Prefix risk
    LabelInjuryIncident Halted
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionInjuryThe incident has halted or paused with a high likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13728,13 +8314,18 @@

    Integrity Incident

    - - @@ -13745,7 +8336,7 @@

    Integrity Incident

    - + @@ -13774,55 +8365,36 @@

    Integrity Incident

    - -
    -

    Interception of Communications

    +
    +

    Incident Identifier

    TermIntegrityIncidentIncidentHandlingReport Prefix risk
    LabelIntegrity IncidentIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#IncidentHandlingReport
    Broader/Parent types risk:Incident + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident where the integrity of information or system has been affectedA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    - + - + - + - + - - - - - - - - - - - + + + @@ -13831,34 +8403,28 @@

    Interception of Communications

    - + - - - - + - + - - - - + - @@ -13866,53 +8432,49 @@

    Interception of Communications

    - -
    -

    Internal Operation Disruption

    +
    +

    Incident Impact Assessment

    TermInterceptionCommunicationsIncidentIdentifier Prefix risk
    LabelInterception of CommunicationsIncident Identifier
    IRIhttps://w3id.org/dpv/risk#InterceptionCommunicationshttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInterception of CommunicationsIdentifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13923,23 +8485,20 @@

    Internal Operation Disruption

    - + - - - - + - + @@ -13950,7 +8509,7 @@

    Internal Operation Disruption

    - @@ -13959,56 +8518,44 @@

    Internal Operation Disruption

    - - - - -
    -

    Known Vulnerability Exploited

    +
    +

    Incident Mitigated

    TermInternalOperationDisruptionIncidentImpactAssessment Prefix risk
    LabelInternal Operation DisruptionIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#InternalOperationDisruptionhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionInternal Operation DisruptionAn impact assessment associated with a incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14019,23 +8566,20 @@

    Known Vulnerability Exploited

    - + - - - - + - + @@ -14046,7 +8590,7 @@

    Known Vulnerability Exploited

    - @@ -14054,53 +8598,43 @@

    Known Vulnerability Exploited

    - -
    -

    Law Enforcement Adverse Effects

    +
    +

    Incident Mitigation Measure

    TermKnownVulnerabilityExploitedIncidentMitigated Prefix risk
    LabelKnown Vulnerability ExploitedIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#KnownVulnerabilityExploitedhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionKnown Vulnerability ExploitedThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14111,34 +8645,28 @@

    Law Enforcement Adverse Effects

    - + - - - - + - + - - - - + - @@ -14147,53 +8675,44 @@

    Law Enforcement Adverse Effects

    -
    -

    Limitation of Rights

    +
    +

    Incident Near Miss

    TermLawEnforcementAdverseEffectsIncidentMitigationMeasure Prefix risk
    LabelLaw Enforcement Adverse EffectsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#LawEnforcementAdverseEffectshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure
    DefinitionLaw Enforcement Adverse EffectsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14204,7 +8723,7 @@

    Limitation of Rights

    - + @@ -14217,18 +8736,18 @@

    Limitation of Rights

    - + - + - @@ -14236,54 +8755,45 @@

    Limitation of Rights

    - -
    -

    Loss of Assets

    +
    +

    Incident Notice

    TermLimitationOfRightsIncidentNearMiss Prefix risk
    LabelLimitation of RightsIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#LimitationOfRightshttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLimitation of RightsThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2022-08-182024-02-14
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14294,34 +8804,28 @@

    Loss of Assets

    - + - - - - + - + - - - - + - @@ -14330,53 +8834,44 @@

    Loss of Assets

    -
    -

    Loss of Competitive Advantage

    +
    +

    Incident Ongoing

    TermLossAssetsIncidentNotice Prefix risk
    LabelLoss of AssetsIncident Notice
    IRIhttps://w3id.org/dpv/risk#LossAssetshttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of AssetsNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14387,23 +8882,20 @@

    Loss of Competitive Advantage

    - + - - - - + - + @@ -14414,7 +8906,7 @@

    Loss of Competitive Advantage

    - @@ -14422,54 +8914,46 @@

    Loss of Competitive Advantage

    - -
    -

    Loss of Control over Data

    +
    +

    Incident Ongoing Report

    TermLossCompetitiveAdvantageIncidentOngoing Prefix risk
    LabelLoss of Competitive AdvantageIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#LossCompetitiveAdvantagehttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Competitive AdvantageThe incident is ongoing i.e. still active
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - + + - @@ -14480,7 +8964,7 @@

    Loss of Control over Data

    - + @@ -14493,18 +8977,15 @@

    Loss of Control over Data

    - + - - - - + - @@ -14512,53 +8993,46 @@

    Loss of Control over Data

    - -
    -

    Loss of Credibility

    +
    +

    Incident Preliminary Report

    TermLossControlOverDataIncidentOngoingReport Prefix risk
    LabelLoss of Control over DataIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#LossControlOverDatahttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Control over DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14569,34 +9043,28 @@

    Loss of Credibility

    - + - - - - + - + - - - - + - @@ -14604,53 +9072,45 @@

    Loss of Credibility

    - -
    -

    Loss of Customer Confidence

    +
    +

    Incident Register

    TermLossCredibilityIncidentPreliminaryReport Prefix risk
    LabelLoss of CredibilityIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#LossCredibilityhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CredibilityA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14661,23 +9121,20 @@

    Loss of Customer Confidence

    - + - - - - + - + @@ -14688,7 +9145,7 @@

    Loss of Customer Confidence

    - @@ -14696,54 +9153,45 @@

    Loss of Customer Confidence

    - -
    -

    Loss of Customers

    +
    +

    Incident Report

    TermLossCustomerConfidenceIncidentRegister Prefix risk
    LabelLoss of Customer ConfidenceIncident Register
    IRIhttps://w3id.org/dpv/risk#LossCustomerConfidencehttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Customer ConfidenceA register recording incidentes, their reports, notifications, and other related activities
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14754,34 +9202,28 @@

    Loss of Customers

    - + - - - - + - + - - - - + - @@ -14789,54 +9231,43 @@

    Loss of Customers

    - -
    -

    Loss of Data

    +
    +

    Incident Status

    TermLossCustomersIncidentReport Prefix risk
    LabelLoss of CustomersIncident Report
    IRIhttps://w3id.org/dpv/risk#LossCustomershttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CustomersDocumented information about an incident, its handling, assessments,and notifications
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14847,23 +9278,23 @@

    Loss of Data

    - + + + + - - - - + - + @@ -14874,7 +9305,7 @@

    Loss of Data

    - @@ -14883,53 +9314,44 @@

    Loss of Data

    -
    -

    Loss of Funds

    +
    +

    Incident Status Unknown

    TermLossDataIncidentStatus Prefix risk
    LabelLoss of DataIncident Status
    IRIhttps://w3id.org/dpv/risk#LossDatahttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of DataStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - - - - + - @@ -14940,23 +9362,20 @@

    Loss of Funds

    - + - - - - + - + @@ -14967,7 +9386,7 @@

    Loss of Funds

    - @@ -14976,53 +9395,44 @@

    Loss of Funds

    -
    -

    Loss of Goods

    +
    +

    Incident Suspected

    TermLossFundsIncidentStatusUnknown Prefix risk
    LabelLoss of FundsIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#LossFundshttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of FundsThe status of a incident is unknown
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15033,23 +9443,20 @@

    Loss of Goods

    - + - - - - + - + @@ -15060,7 +9467,7 @@

    Loss of Goods

    - @@ -15068,53 +9475,46 @@

    Loss of Goods

    - -
    -

    Loss of Goodwill

    +
    +

    Incident Suspected Report

    TermLossGoodsIncidentSuspected Prefix risk
    LabelLoss of GoodsIncident Suspected
    IRIhttps://w3id.org/dpv/risk#LossGoodshttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of GoodsThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15125,34 +9525,28 @@

    Loss of Goodwill

    - + - - - - + - + - - - - + - @@ -15161,52 +9555,44 @@

    Loss of Goodwill

    -
    -

    Loss of Negotiating Capacity

    +
    +

    Incident Terminated

    TermLossGoodwillIncidentSuspectedReport Prefix risk
    LabelLoss of GoodwillIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#LossGoodwillhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of GoodwillA report describing the suspicion of an incident in the past or occuring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -15217,23 +9603,20 @@

    Loss of Negotiating Capacity

    - + - - - - - - + + + - + @@ -15244,7 +9627,7 @@

    Loss of Negotiating Capacity

    - @@ -15253,85 +9636,58 @@

    Loss of Negotiating Capacity

    -
    -

    Loss of Opportunity

    +
    +

    Individual Health & Safety

    TermLossNegotiatingCapacityIncidentTerminated Prefix risk
    LabelLoss of Negotiating CapacityIncident Terminated
    IRIhttps://w3id.org/dpv/risk#LossNegotiatingCapacityhttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Negotiating CapacityThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15344,56 +9700,36 @@

    Loss of Opportunity

    - -
    -

    Loss of Proprietary Information

    +
    +

    Individual Risk

    TermLossOpportunityIndividualHealthSafety Prefix risk
    LabelLoss of OpportunityIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#LossOpportunityhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - - - + + + @@ -15402,29 +9738,20 @@

    Loss of Proprietary Information

    - + - - - - + - - - - + - - - - + @@ -15438,54 +9765,39 @@

    Loss of Proprietary Information

    -
    -

    Loss of Reputation

    +
    +

    Injury

    TermLossProprietaryInformationIndividualRisk Prefix risk
    LabelLoss of Proprietary InformationIndividual Risk
    IRIhttps://w3id.org/dpv/risk#LossProprietaryInformationhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Proprietary InformationRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15494,7 +9806,7 @@

    Loss of Reputation

    - + @@ -15512,7 +9824,10 @@

    Loss of Reputation

    - + + + + @@ -15530,86 +9845,61 @@

    Loss of Reputation

    -
    -

    Loss of Resources

    +
    +

    None

    TermLossReputationInjury Prefix risk
    LabelLoss of ReputationInjury
    IRIhttps://w3id.org/dpv/risk#LossReputationhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of ReputationSomething that acts as or causes Injury
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15622,54 +9912,42 @@

    Loss of Resources

    - -
    -

    Loss of Suppliers

    +
    +

    Integrity Incident

    TermLossResourcesIntegrityBreach Prefix risk
    LabelLoss of ResourcesNone
    IRIhttps://w3id.org/dpv/risk#LossResourceshttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Resources
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -15680,34 +9958,28 @@

    Loss of Suppliers

    - + - - - - + - + - - - - + - @@ -15716,55 +9988,40 @@

    Loss of Suppliers

    -
    -

    Loss of Technological Advantage

    +
    +

    Intentional Misuse

    TermLossSuppliersIntegrityIncident Prefix risk
    LabelLoss of SuppliersIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#LossSuppliershttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionLoss of SuppliersIncident where the integrity of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -15773,29 +10030,20 @@

    Loss of Technological Advantage

    - + - - - - + - - - - + - - - - + @@ -15809,54 +10057,40 @@

    Loss of Technological Advantage

    -
    -

    Loss of Trust

    +
    +

    Intercept Communications

    TermLossTechnologicalAdvantageIntentionalMisuse Prefix risk
    LabelLoss of Technological AdvantageIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#LossTechnologicalAdvantagehttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Technological AdvantageIntentional Misuse
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15865,9 +10099,12 @@

    Loss of Trust

    - + - + + + + @@ -15883,7 +10120,10 @@

    Loss of Trust

    - + + + + @@ -15901,52 +10141,39 @@

    Loss of Trust

    -
    -

    Low Likelihood

    +
    +

    Internal Security Threat

    TermLossTrustInterceptCommunications Prefix risk
    LabelLoss of TrustIntercept Communications
    IRIhttps://w3id.org/dpv/risk#LossTrusthttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of TrustSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -15955,12 +10182,9 @@

    Low Likelihood

    - + - - - - + @@ -15969,20 +10193,14 @@

    Low Likelihood

    - - - - + - - - - + - @@ -15991,52 +10209,44 @@

    Low Likelihood

    -
    -

    Low Risk

    + + + + +
    +

    Judicial Costs

    TermLowLikelihoodInternalSecurityThreat Prefix risk
    LabelLow LikelihoodInternal Security Threat
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#InternalSecurityThreat
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowConcepts associated with security threats and issues that originate within the organisation
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - - - - - - - - - - - + + + + + + + - - - - - + @@ -16045,12 +10255,9 @@

    Low Risk

    - + - - - - + @@ -16059,20 +10266,14 @@

    Low Risk

    - - - - + - - - - + - @@ -16081,52 +10282,40 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Judicial Penalty

    TermLowRiskJudicialCosts Prefix risk
    LabelLow RiskJudicial Costs
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that involves or causes judicial costs to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16135,12 +10324,9 @@

    Low Severity

    - + - - - - + @@ -16149,20 +10335,14 @@

    Low Severity

    - - - - + - - - - + - @@ -16171,54 +10351,39 @@

    Low Severity

    -
    -

    Malicious Code Attack

    +
    +

    Legal Risk

    TermLowSeverityJudicialPenalty Prefix risk
    LabelLow SeverityJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowSomething that involves or causes judicial penalties to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -16227,29 +10392,20 @@

    Malicious Code Attack

    - + - - - - + - - - - + - - - - + @@ -16263,54 +10419,40 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Lose of Credibility

    TermMaliciousCodeAttackLegalRisk Prefix risk
    LabelMalicious Code AttackLegal Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIntentional use of software by including or inserting in a system for a harmful purposeRisks and issues that have their basis in legal requirements and enforcement
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16319,7 +10461,7 @@

    Malware Attack

    - + @@ -16328,7 +10470,7 @@

    Malware Attack

    - + @@ -16337,7 +10479,10 @@

    Malware Attack

    - + + + + @@ -16355,54 +10500,40 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Lose of Customer Confidence

    TermMalwareAttackLoseCredibility Prefix risk
    LabelMalware AttackLose of Credibility
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMalware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a systemSomething that acts as or causes Loss of Credibility
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16411,22 +10542,28 @@

    Material Damage

    - + - + + + + - + - + + + + @@ -16444,54 +10581,40 @@

    Material Damage

    -
    -

    Misinformation and Disinformation

    +
    +

    Lose of Goodwill

    TermMaterialDamageLoseCustomerConfidence Prefix risk
    LabelMaterial DamageLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact that acts as or causes material damagesSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-03-302022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16500,7 +10623,7 @@

    Misinformation and Disinformation

    - + @@ -16509,7 +10632,7 @@

    Misinformation and Disinformation

    - + @@ -16518,7 +10641,10 @@

    Misinformation and Disinformation

    - + + + + @@ -16536,53 +10662,40 @@

    Misinformation and Disinformation

    -
    -

    Misuse

    +
    +

    Lose of Negotiating Capacity

    TermMisinformationDisinformationLoseGoodwill Prefix risk
    LabelMisinformation and DisinformationLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#MisinformationDisinformationhttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInformation that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)Something that acts as or causes Loss of Goodwill
    SourceENISA Threat Landscape 2021ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16591,25 +10704,31 @@

    Misuse

    - + - + + + + - + - + + + + - + @@ -16624,54 +10743,40 @@

    Misuse

    -
    -

    Misuse of Breached Information

    +
    +

    Lose of Opportunity

    TermMisuseLoseNegotiatingCapacity Prefix risk
    LabelMisuseLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuseSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-06-112022-08-17
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16680,7 +10785,7 @@

    Misuse of Breached Information

    - + @@ -16698,7 +10803,10 @@

    Misuse of Breached Information

    - + + + + @@ -16716,52 +10824,40 @@

    Misuse of Breached Information

    -
    -

    Moderate Likelihood

    +
    +

    Lose of Reputation

    TermMisuseBreachedInformationLoseOpportunity Prefix risk
    LabelMisuse of Breached InformationLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#MisuseBreachedInformationhttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuse of Breached InformationSomething that acts as or causes Loss of Opportunity
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -16770,25 +10866,28 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -16797,7 +10896,7 @@

    Moderate Likelihood

    - @@ -16806,52 +10905,40 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    +
    +

    Lose of Trust

    TermModerateLikelihoodLoseReputation Prefix risk
    LabelModerate LikelihoodLose of Reputation
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateSomething that acts as or causes Loss of Reputation
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16860,25 +10947,28 @@

    Moderate Risk

    - + - - - - + - + + + + - + - + + + + @@ -16887,7 +10977,7 @@

    Moderate Risk

    - @@ -16896,50 +10986,50 @@

    Moderate Risk

    -
    -

    Moderate Severity

    +
    +

    Low Likelihood

    TermModerateRiskLoseTrust Prefix risk
    LabelModerate RiskLose of Trust
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Loss of Trust
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - @@ -16950,11 +11040,11 @@

    Moderate Severity

    - + - + @@ -16986,46 +11076,50 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Low Risk

    TermModerateSeverityLowLikelihood Prefix risk
    LabelModerate SeverityLow Likelihood
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity + risk:3LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasSeverity + dpv:hasLikelihood
    DefinitionLevel where Severity is ModerateLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    - + - + - + - + - + + + + - @@ -17036,9 +11130,12 @@

    Monitor Consequence

    - + - + + + + @@ -17049,7 +11146,7 @@

    Monitor Consequence

    - + @@ -17060,7 +11157,7 @@

    Monitor Consequence

    - @@ -17069,45 +11166,50 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Low Severity

    TermMonitorConsequenceLowRisk Prefix risk
    LabelMonitor ConsequenceLow Risk
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that monitors a Risk ConsequenceLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -17118,11 +11220,11 @@

    Monitor Control

    - + - + @@ -17134,7 +11236,7 @@

    Monitor Control

    - + @@ -17145,7 +11247,7 @@

    Monitor Control

    - @@ -17154,48 +11256,40 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Malicious Code Attack

    TermMonitorControlLowSeverity Prefix risk
    LabelMonitor ControlLow Severity
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsLevel where Severity is Low
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -17204,22 +11298,28 @@

    Monitor Impact

    - + - + + + + - + - + + + + @@ -17228,7 +11328,7 @@

    Monitor Impact

    - @@ -17237,48 +11337,40 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Malware Attack

    TermMonitorImpactMaliciousCodeAttack Prefix risk
    LabelMonitor ImpactMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17287,22 +11379,28 @@

    Monitor Risk

    - + - + + + + - + - + + + + @@ -17311,7 +11409,7 @@

    Monitor Risk

    - @@ -17320,48 +11418,40 @@

    Monitor Risk

    -
    -

    Monitor Control

    +
    +

    Material Damage

    TermMonitorRiskMalwareAttack Prefix risk
    LabelMonitor RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskSomething that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17370,9 +11460,12 @@

    Monitor Control

    - + - + + + + @@ -17383,9 +11476,12 @@

    Monitor Control

    - + - + + + + @@ -17394,7 +11490,7 @@

    Monitor Control

    - @@ -17403,48 +11499,40 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    +
    +

    Misuse

    TermMonitorRiskControlMaterialDamage Prefix risk
    LabelMonitor ControlMaterial Damage
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17453,7 +11541,7 @@

    Monitor Risk Source

    - + @@ -17466,18 +11554,21 @@

    Monitor Risk Source

    - + - + + + + - + - @@ -17486,46 +11577,50 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    +
    +

    Moderate Likelihood

    TermMonitorRiskSourceMisuse Prefix risk
    LabelMonitor Risk SourceMisuse
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -17536,9 +11631,12 @@

    Monitor Vulnerabilities

    - + - + + + + @@ -17549,7 +11647,7 @@

    Monitor Vulnerabilities

    - + @@ -17560,7 +11658,7 @@

    Monitor Vulnerabilities

    - @@ -17569,52 +11667,50 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    +
    +

    Moderate Risk

    TermMonitorVulnerabilitiesModerateLikelihood Prefix risk
    LabelMonitor VulnerabilitiesModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that monitors a Risk VulnerabilityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17625,9 +11721,12 @@

    Non-Material Damage

    - + - + + + + @@ -17638,7 +11737,7 @@

    Non-Material Damage

    - + @@ -17649,7 +11748,7 @@

    Non-Material Damage

    - @@ -17658,52 +11757,50 @@

    Non-Material Damage

    -
    -

    Organisation Disruption

    +
    +

    Moderate Severity

    TermNonMaterialDamageModerateRisk Prefix risk
    LabelNon-Material DamageModerate Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Damage - → dpv:Risk + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes non-material damagesLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17714,23 +11811,23 @@

    Organisation Disruption

    - + - + + + + - - - - + - + @@ -17741,7 +11838,7 @@

    Organisation Disruption

    - @@ -17750,49 +11847,46 @@

    Organisation Disruption

    -
    -

    Payment

    +
    +

    Monitor Consequence

    TermOrganisationDisruptionModerateSeverity Prefix risk
    LabelOrganisation DisruptionModerate Severity
    IRIhttps://w3id.org/dpv/risk#OrganisationDisruptionhttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionOrganisation DisruptionLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -17803,7 +11897,7 @@

    Payment

    - + @@ -17816,18 +11910,18 @@

    Payment

    - + - + - @@ -17836,53 +11930,45 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Monitor Control

    TermPaymentMonitorConsequence Prefix risk
    LabelPaymentMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPayment provided as compensation (as an impact)Control that monitors a Risk Consequence
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17893,23 +11979,23 @@

    Personal Safety Endangerment

    - + - + + + + - - - - + - + @@ -17920,7 +12006,7 @@

    Personal Safety Endangerment

    - @@ -17929,53 +12015,46 @@

    Personal Safety Endangerment

    -
    -

    Personnel Absence

    +
    +

    Monitor Impact

    TermPersonalSafetyEndangermentMonitorControl Prefix risk
    LabelPersonal Safety EndangermentMonitor Control
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonal Safety EndangermentRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17986,23 +12065,20 @@

    Personnel Absence

    - + - - - - + - + @@ -18013,7 +12089,7 @@

    Personnel Absence

    - @@ -18022,53 +12098,46 @@

    Personnel Absence

    -
    -

    Phishing Scam

    +
    +

    Monitor Risk

    TermPersonnelAbsenceMonitorImpact Prefix risk
    LabelPersonnel AbsenceMonitor Impact
    IRIhttps://w3id.org/dpv/risk#PersonnelAbsencehttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonnel AbsenceControl that monitors a Risk Impact
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18079,23 +12148,20 @@

    Phishing Scam

    - + - - - - + - + @@ -18106,7 +12172,7 @@

    Phishing Scam

    - @@ -18115,53 +12181,46 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Monitor Control

    TermPhishingScamMonitorRisk Prefix risk
    LabelPhishing ScamMonitor Risk
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA type of social engineering attack involving deceptive messages intended to reveal sensitive informationControl that monitors a Risk
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18172,23 +12231,20 @@

    Physical Assault

    - + - - - - + - + @@ -18199,7 +12255,7 @@

    Physical Assault

    - @@ -18208,53 +12264,46 @@

    Physical Assault

    -
    -

    Physical Spying

    +
    +

    Monitor Risk Source

    TermPhysicalAssaultMonitorRiskControl Prefix risk
    LabelPhysical AssaultMonitor Control
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical AssaultControl that monitors another Control
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18265,23 +12314,20 @@

    Physical Spying

    - + - - - - + - + @@ -18292,7 +12338,7 @@

    Physical Spying

    - @@ -18301,53 +12347,46 @@

    Physical Spying

    -
    -

    Physical Stalking

    +
    +

    Monitor Vulnerabilities

    TermPhysicalSpyingMonitorRiskSource Prefix risk
    LabelPhysical SpyingMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#PhysicalSpyinghttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical SpyingControl that monitors a Risk Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18358,23 +12397,20 @@

    Physical Stalking

    - + - - - - + - + @@ -18385,7 +12421,7 @@

    Physical Stalking

    - @@ -18394,55 +12430,40 @@

    Physical Stalking

    -
    -

    Prevent Exercising of Rights

    +
    +

    Non-Material Damage

    TermPhysicalStalkingMonitorVulnerabilities Prefix risk
    LabelPhysical StalkingMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#PhysicalStalkinghttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical StalkingControl that monitors a Risk Vulnerability
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -18451,9 +12472,12 @@

    Prevent Exercising of Rights

    - + - + + + + @@ -18464,12 +12488,15 @@

    Prevent Exercising of Rights

    - + - + + + + - + @@ -18484,53 +12511,39 @@

    Prevent Exercising of Rights

    -
    -

    Privacy impact

    +
    +

    Operational Security Risk

    TermPreventExercisingOfRightsNonMaterialDamage Prefix risk
    LabelPrevent Exercising of RightsNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#PreventExercisingOfRightshttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrevent Exercising of RightsSomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-08-182022-03-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18539,29 +12552,20 @@

    Privacy impact

    - + - - - - + - - - - + - - - - + @@ -18575,55 +12579,40 @@

    Privacy impact

    -
    -

    Psychological Harm

    +
    +

    Payment

    TermPrivacyImpactOperationalSecurityRisk Prefix risk
    LabelPrivacy impactOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#PrivacyImpacthttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrivacy impactRisks and issues that arise during operational processes
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18632,28 +12621,28 @@

    Psychological Harm

    - + - - - - + - + - + + + + - + @@ -18668,54 +12657,40 @@

    Psychological Harm

    -
    -

    Public Order Breach

    +
    +

    Personal Safety Endangerment

    TermPsychologicalHarmPayment Prefix risk
    LabelPsychological HarmPayment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPsychological HarmSomething that acts as or provides payment e.g. to access a service or purchase resources
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18724,7 +12699,7 @@

    Public Order Breach

    - + @@ -18742,7 +12717,10 @@

    Public Order Breach

    - + + + + @@ -18760,55 +12738,40 @@

    Public Order Breach

    -
    -

    Ransomware Attack

    +
    +

    Phishing Scam

    TermPublicOrderBreachPersonalSafetyEndangerment Prefix risk
    LabelPublic Order BreachPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPublic Order BreachSomething that acts as or causes Personal Safety Endangerment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18817,7 +12780,7 @@

    Ransomware Attack

    - + @@ -18826,7 +12789,7 @@

    Ransomware Attack

    - + @@ -18835,7 +12798,10 @@

    Ransomware Attack

    - + + + + @@ -18853,47 +12819,39 @@

    Ransomware Attack

    -
    -

    Recovery Control

    +
    +

    Physical Assault

    TermRansomwareAttackPhishingScam Prefix risk
    LabelRansomware AttackPhishing Scam
    IRIhttps://w3id.org/dpv/risk#RansomwareAttackhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRansomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentialitySomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -18902,28 +12860,37 @@

    Recovery Control

    - + - + + + + - + - - + + + + + + + + - @@ -18932,58 +12899,46 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Physical Harm

    TermRecoveryControlPhysicalAssault Prefix risk
    LabelRecovery ControlPhysical Assault
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSomething that acts as or causes Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -18993,20 +12948,14 @@

    Reduce Likelihood

    - - - - + - - - - + - @@ -19015,58 +12964,46 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Privacy

    TermReduceLikelihoodPhysicalHarm Prefix risk
    LabelReduce LikelihoodPhysical Harm
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -19076,20 +13013,14 @@

    Reduce Severity

    - - - - + - - - - + - @@ -19098,47 +13029,39 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Psychological Harm

    TermReduceSeverityPrivacy Prefix risk
    LabelReduce SeverityPrivacy
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -19147,28 +13070,37 @@

    Reduction Control

    - + - + + + + - + - - + + + + + + + + - @@ -19177,55 +13109,40 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Public Order Breach

    TermReductionControlPsychologicalHarm Prefix risk
    LabelReduction ControlPsychological Harm
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or causes Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -19234,22 +13151,28 @@

    Re-identification

    - + - + + + + - + - + + + + @@ -19267,23 +13190,23 @@

    Re-identification

    -
    -

    Remedy Control

    +
    +

    Recovery Control

    TermReidentificationPublicOrderBreach Prefix risk
    LabelRe-identificationPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRe-identificationSomething that acts as or causes Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + @@ -19316,7 +13239,7 @@

    Remedy Control

    - + @@ -19346,53 +13269,46 @@

    Remedy Control

    -
    -

    Remote Spying

    +
    +

    Reduce Likelihood

    TermRemedyControlRecoveryControl Prefix risk
    LabelRemedy ControlRecovery Control
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RecoveryControl
    DefinitionControl to remedy consequences of eventControl to recover from event
    - + - + - + - + - - - - - + - @@ -19403,23 +13319,20 @@

    Remote Spying

    - + - - - - + - + @@ -19430,7 +13343,7 @@

    Remote Spying

    - @@ -19439,23 +13352,23 @@

    Remote Spying

    -
    -

    Remove Consequence

    +
    +

    Reduce Severity

    TermRemoteSpyingReduceLikelihood Prefix risk
    LabelRemote SpyingReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#RemoteSpyinghttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRemote SpyingControl that reduces the likelihood of an event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -19467,7 +13380,7 @@

    Remove Consequence

    - - + @@ -19522,23 +13435,23 @@

    Remove Consequence

    -
    -

    Remove Impact

    +
    +

    Reduction Control

    TermRemoveConsequenceReduceSeverity Prefix risk
    LabelRemove ConsequenceReduce Severity
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#ReduceSeverity
    Broader/Parent types risk:ConsequenceControl + risk:ReductionControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -19489,7 +13402,7 @@

    Remove Consequence

    DefinitionControl that removes Consequence i.e. prevents it from materialisingControl that reduces the severity of an event
    - + - + - + @@ -19550,8 +13463,7 @@

    Remove Impact

    - @@ -19572,7 +13484,7 @@

    Remove Impact

    - + @@ -19586,12 +13498,9 @@

    Remove Impact

    - - - - - - + + + @@ -19605,48 +13514,42 @@

    Remove Impact

    -
    -

    Remove Source

    + + +
    +

    Re-identification

    TermRemoveImpactReductionControl Prefix risk
    LabelRemove ImpactReduction Control
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#ReductionControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that removes Impact i.e. prevents it from materialisingControl that reduces the likelihood or severity of an event
    Date Created 2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -19655,9 +13558,12 @@

    Remove Source

    - + - + + + + @@ -19668,9 +13574,12 @@

    Remove Source

    - + - + + + + @@ -19679,7 +13588,7 @@

    Remove Source

    - @@ -19688,49 +13597,45 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Remedy Control

    TermRemoveSourceReidentification Prefix risk
    LabelRemove SourceRe-identification
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceSomething that acts as or causes Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2024-05-192022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -19741,7 +13646,7 @@

    Remuneration

    - + @@ -19754,18 +13659,15 @@

    Remuneration

    - + - - - - + - @@ -19774,52 +13676,46 @@

    Remuneration

    -
    -

    Replacement Costs

    +
    +

    Remove Consequence

    TermRenumerationRemedyControl Prefix risk
    LabelRemunerationRemedy Control
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRenumeration provided as compensation (as an impact)Control to remedy consequences of event
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19830,23 +13726,20 @@

    Replacement Costs

    - + - - - - + - + @@ -19857,7 +13750,7 @@

    Replacement Costs

    - @@ -19866,51 +13759,46 @@

    Replacement Costs

    -
    -

    Reputation and trust impact

    +
    +

    Remove Impact

    TermReplacementCostsRemoveConsequence Prefix risk
    LabelReplacement CostsRemove Consequence
    IRIhttps://w3id.org/dpv/risk#ReplacementCostshttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReplacement CostsControl that removes Consequence i.e. prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19921,23 +13809,20 @@

    Reputation and trust impact

    - + - - - - + - + @@ -19948,7 +13833,7 @@

    Reputation and trust impact

    - @@ -19957,52 +13842,46 @@

    Reputation and trust impact

    -
    -

    Retrieval of Deleted Data

    +
    +

    Remove Source

    TermReputationTrustImpactRemoveImpact Prefix risk
    LabelReputation and trust impactRemove Impact
    IRIhttps://w3id.org/dpv/risk#ReputationTrustImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReputation and trust impactControl that removes Impact i.e. prevents it from materialising
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -20013,23 +13892,20 @@

    Retrieval of Deleted Data

    - + - - - - + - + @@ -20040,7 +13916,7 @@

    Retrieval of Deleted Data

    - @@ -20049,54 +13925,40 @@

    Retrieval of Deleted Data

    -
    -

    Retrieval of Discarded Equipment

    +
    +

    Remuneration

    TermRetrievalDeletedDataRemoveSource Prefix risk
    LabelRetrieval of Deleted DataRemove Source
    IRIhttps://w3id.org/dpv/risk#RetrievalDeletedDatahttps://w3id.org/dpv/risk#RemoveSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRetrieval of Deleted DataControl that removes the risk source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -20105,28 +13967,28 @@

    Retrieval of Discarded Equipment

    - + - - - - + - + - + + + + - + @@ -20141,51 +14003,39 @@

    Retrieval of Discarded Equipment

    -
    -

    Reward

    +
    +

    Reputational Risk

    TermRetrievalDiscardedEquipmentRenumeration Prefix risk
    LabelRetrieval of Discarded EquipmentRemuneration
    IRIhttps://w3id.org/dpv/risk#RetrievalDiscardedEquipmenthttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRetrieval of Discarded EquipmentSomething that acts as or provides renumeration which is in monetary or financial form
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -20194,7 +14044,7 @@

    Reward

    - + @@ -20205,15 +14055,9 @@

    Reward

    - - - - + - - - - + @@ -20224,42 +14068,39 @@

    Reward

    TermRewardReputationalRisk Prefix risk
    LabelRewardReputational Risk
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionReward provided as compensation (as an impact)Risks and issues that affect the reputation of the organisation
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - - - - -
    -

    Risk Analysis

    + +
    +

    Reward

    - + - + - + - + - @@ -20272,34 +14113,34 @@

    Risk Analysis

    - + - - - - + - + - + + + + - + - @@ -20307,35 +14148,37 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Prevent Exercising of Rights

    TermRiskAnalysisReward Prefix risk
    LabelRisk AnalysisReward
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:FinancialImpact + → dpv:RiskConcept
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    SourceIEC 31010:2019
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20348,31 +14191,37 @@

    Risk Assessment

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20380,44 +14229,49 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Impact to Rights

    TermRiskAssessmentRightsExercisePrevention Prefix risk
    LabelRisk AssessmentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionAssessment of risk involving its identification, analysis, and evaluationSomething that acts as or causes Prevent Exercising of Rights
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Source
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + - @@ -20428,31 +14282,40 @@

    Risk Control

    - + + + + + - - - - - + + + + - + - - + + + + + + + + - @@ -20460,33 +14323,38 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Limitation of Rights

    TermRiskControlRightsImpact Prefix risk
    LabelRisk ControlImpact to Rights
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
    DefinitionControl that modifies riskSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -20498,31 +14366,37 @@

    Risk Management

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20531,36 +14405,36 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Violation of Rights

    TermRiskManagementRightsLimitation Prefix risk
    LabelRisk ManagementLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskSomething that acts as or causes Limitation of Rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Source
    Date Created2024-06-122022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20573,72 +14447,77 @@

    Risk Matrix

    - + - + + + + - - - - + - + - + + + + - + -
    TermRiskMatrixRightsViolation Prefix risk
    LabelRisk MatrixViolation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Something that acts as or causes Violation of Rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    + + + + - -
    -

    Risk Matrix 3x3

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -20652,20 +14531,23 @@

    Risk Matrix 3x3

    - + - + + + + - + @@ -20676,7 +14558,7 @@

    Risk Matrix 3x3

    - @@ -20684,38 +14566,35 @@

    Risk Matrix 3x3

    - -
    -

    Risk Matrix 5x5

    +
    +

    Risk Assessment

    TermRiskMatrix3x3RiskAnalysis Prefix risk
    LabelRisk Matrix 3x3Risk Analysis
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-172022-08-18
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - @@ -20728,31 +14607,31 @@

    Risk Matrix 5x5

    - + - + + + + - + - - - - + - @@ -20760,42 +14639,46 @@

    Risk Matrix 5x5

    - -
    -

    Risk Matrix 7x7

    +
    +

    Risk Control

    TermRiskMatrix5x5RiskAssessment Prefix risk
    LabelRisk Matrix 5x5Risk Assessment
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -20804,10 +14687,13 @@

    Risk Matrix 7x7

    - + + + + @@ -20817,18 +14703,15 @@

    Risk Matrix 7x7

    - + - - - - + - @@ -20836,23 +14719,23 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    +
    +

    Risk Management

    TermRiskMatrix7x7RiskControl Prefix risk
    LabelRisk Matrix 7x7Risk Control
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in DEX
    - + - + - + @@ -20865,11 +14748,7 @@

    Risk Source

    - - - - + @@ -20878,20 +14757,23 @@

    Risk Source

    - + - + + + + - + @@ -20908,37 +14790,35 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Risk Matrix

    TermRiskSourceRiskManagement Prefix risk
    LabelRisk SourceRisk Management
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-02-142024-06-12
    - + - + - + - + - @@ -20952,20 +14832,23 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + - + @@ -20976,7 +14859,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - @@ -20985,23 +14868,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Risk Matrix 3x3

    TermRM3x3S1L1RiskMatrix Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Risk Matrix
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2022-08-172024-02-14
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21013,8 +14896,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - @@ -21029,7 +14911,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - + @@ -21062,23 +14944,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Risk Matrix 5x5

    TermRM3x3S1L2RiskMatrix3x3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Risk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RiskMatrix3x3
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    - + - + - + @@ -21090,8 +14972,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - @@ -21106,7 +14987,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + @@ -21139,23 +15020,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Risk Matrix 7x7

    TermRM3x3S1L3RiskMatrix5x5 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Risk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RiskMatrix5x5
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    - + - + - + @@ -21167,8 +15048,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - @@ -21183,7 +15063,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - + @@ -21215,43 +15095,43 @@

    Low Risk (RM3x3 S:2 L:1)

    - -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Risk Source

    TermRM3x3S2L1RiskMatrix7x7 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Risk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RiskMatrix7x7
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    - + - + - + - + - - + + + + @@ -21260,7 +15140,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + @@ -21273,18 +15153,18 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + - - - - + + + + - @@ -21293,23 +15173,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRM3x3S2L2RiskSource Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Risk Source
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Date Modified2024-08-16
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21337,7 +15217,7 @@

    High Risk (RM3x3 S:2 L:3)

    - + @@ -21370,23 +15250,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRM3x3S2L3RM3x3S1L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Low Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM3x3S1L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21414,7 +15294,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - + @@ -21447,23 +15327,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRM3x3S3L1RM3x3S1L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM3x3S1L2
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -21491,7 +15371,7 @@

    High Risk (RM3x3 S:3 L:2)

    - + @@ -21524,23 +15404,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRM3x3S3L2RM3x3S1L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM3x3S1L3
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -21568,7 +15448,7 @@

    High Risk (RM3x3 S:3 L:3)

    - + @@ -21601,23 +15481,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRM3x3S3L3RM3x3S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM3x3S2L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21629,7 +15509,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - - + @@ -21678,23 +15558,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRM5x5S1L1RM3x3S2L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Moderate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM3x3S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21645,7 +15525,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -21706,7 +15586,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - - + @@ -21755,23 +15635,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRM5x5S1L2RM3x3S2L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21722,7 +15602,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -21783,7 +15663,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - - + @@ -21832,23 +15712,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRM5x5S1L3RM3x3S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21799,7 +15679,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -21860,7 +15740,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - - + @@ -21909,23 +15789,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRM5x5S1L4RM3x3S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21876,7 +15756,7 @@

    Low Risk (RM5x5 S:1 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -21937,7 +15817,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - - + @@ -21986,23 +15866,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRM5x5S1L5RM3x3S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM3x3S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21953,7 +15833,7 @@

    Low Risk (RM5x5 S:1 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22030,7 +15910,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -22063,23 +15943,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM5x5S2L1RM5x5S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S1L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22107,7 +15987,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -22140,23 +16020,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM5x5S2L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S1L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22184,7 +16064,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -22217,23 +16097,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM5x5S2L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S1L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22261,7 +16141,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -22294,23 +16174,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM5x5S2L4RM5x5S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S1L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22338,7 +16218,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -22371,23 +16251,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM5x5S2L5RM5x5S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S1L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -22415,7 +16295,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -22448,23 +16328,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM5x5S3L1RM5x5S2L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S2L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22492,7 +16372,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -22525,23 +16405,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM5x5S3L2RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S2L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -22569,7 +16449,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -22602,23 +16482,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM5x5S3L3RM5x5S2L3 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S2L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -22646,7 +16526,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -22679,23 +16559,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM5x5S3L4RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S2L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -22723,7 +16603,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -22756,23 +16636,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S3L5RM5x5S2L5 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -22800,7 +16680,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -22833,23 +16713,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S4L1RM5x5S3L1 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22877,7 +16757,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - + @@ -22910,23 +16790,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S4L2RM5x5S3L2 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22954,7 +16834,7 @@

    High Risk (RM5x5 S:4 L:3)

    - + @@ -22987,23 +16867,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S4L3RM5x5S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23031,7 +16911,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - + @@ -23064,23 +16944,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S4L4RM5x5S3L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23108,7 +16988,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - + @@ -23141,23 +17021,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S4L5RM5x5S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23185,7 +17065,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - + @@ -23218,23 +17098,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S5L1RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23262,7 +17142,7 @@

    High Risk (RM5x5 S:5 L:2)

    - + @@ -23295,23 +17175,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S5L2RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23339,7 +17219,7 @@

    High Risk (RM5x5 S:5 L:3)

    - + @@ -23372,23 +17252,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S5L3RM5x5S4L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23416,7 +17296,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - + @@ -23449,23 +17329,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S5L4RM5x5S4L4 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23493,7 +17373,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - + @@ -23526,23 +17406,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S5L5RM5x5S4L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23554,7 +17434,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - - + @@ -23603,23 +17483,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM7x7S1L1RM5x5S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23570,7 +17450,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23631,7 +17511,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - - + @@ -23680,23 +17560,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM7x7S1L2RM5x5S5L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23647,7 +17527,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -23708,7 +17588,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - - + @@ -23757,23 +17637,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM7x7S1L3RM5x5S5L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23724,7 +17604,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23785,7 +17665,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - - + @@ -23834,23 +17714,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM7x7S1L4RM5x5S5L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23801,7 +17681,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23862,7 +17742,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - - + @@ -23911,23 +17791,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM7x7S1L5RM5x5S5L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23878,7 +17758,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23955,7 +17835,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -23988,23 +17868,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM7x7S1L6RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S1L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24032,7 +17912,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -24065,23 +17945,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM7x7S1L7RM7x7S1L2 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S1L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24109,7 +17989,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -24142,23 +18022,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM7x7S2L1RM7x7S1L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S1L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24186,7 +18066,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -24219,23 +18099,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM7x7S2L2RM7x7S1L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S1L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24263,7 +18143,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -24296,23 +18176,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM7x7S2L3RM7x7S1L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S1L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -24340,7 +18220,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -24373,23 +18253,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S2L4RM7x7S1L6 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S1L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24417,7 +18297,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -24450,23 +18330,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM7x7S2L5RM7x7S1L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S1L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -24494,7 +18374,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -24527,23 +18407,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM7x7S2L6RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S2L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24571,7 +18451,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -24604,23 +18484,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM7x7S2L7RM7x7S2L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S2L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24648,7 +18528,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -24681,23 +18561,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM7x7S3L1RM7x7S2L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S2L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -24725,7 +18605,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -24758,23 +18638,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S3L2RM7x7S2L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -24802,7 +18682,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -24835,23 +18715,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S3L3RM7x7S2L5 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -24879,7 +18759,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -24912,23 +18792,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S3L4RM7x7S2L6 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -24956,7 +18836,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -24989,23 +18869,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S3L5RM7x7S2L7 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25033,7 +18913,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -25066,23 +18946,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S3L6RM7x7S3L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25110,7 +18990,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -25143,23 +19023,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S3L7RM7x7S3L2 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25187,7 +19067,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -25220,23 +19100,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S4L1RM7x7S3L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25264,7 +19144,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -25297,23 +19177,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S4L2RM7x7S3L4 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25341,7 +19221,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -25374,23 +19254,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S4L3RM7x7S3L5 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25418,7 +19298,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -25451,23 +19331,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S4L4RM7x7S3L6 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -25495,7 +19375,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -25528,23 +19408,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S4L5RM7x7S3L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -25572,7 +19452,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -25605,23 +19485,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S4L6RM7x7S4L1 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25649,7 +19529,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -25682,23 +19562,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S4L7RM7x7S4L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -25726,7 +19606,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -25759,23 +19639,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S5L1RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -25803,7 +19683,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -25836,23 +19716,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S5L2RM7x7S4L4 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -25880,7 +19760,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -25913,23 +19793,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S5L3RM7x7S4L5 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25957,7 +19837,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -25990,23 +19870,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S5L4RM7x7S4L6 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26034,7 +19914,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -26067,23 +19947,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S5L5RM7x7S4L7 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26111,7 +19991,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -26144,23 +20024,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S5L6RM7x7S5L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26188,7 +20068,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -26221,23 +20101,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S5L7RM7x7S5L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26265,7 +20145,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -26298,23 +20178,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S6L1RM7x7S5L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26342,7 +20222,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -26375,23 +20255,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S6L2RM7x7S5L4 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26419,7 +20299,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -26452,23 +20332,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S6L3RM7x7S5L5 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -26496,7 +20376,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -26529,23 +20409,23 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S6L4RM7x7S5L6 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -26573,7 +20453,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -26606,23 +20486,23 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S6L5RM7x7S5L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -26650,7 +20530,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + @@ -26683,23 +20563,23 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S6L6RM7x7S6L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26727,7 +20607,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -26760,23 +20640,23 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S6L7RM7x7S6L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -26804,7 +20684,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - + @@ -26837,23 +20717,23 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S7L1RM7x7S6L3 Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -26881,7 +20761,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -26914,23 +20794,23 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S7L2RM7x7S6L4 Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -26958,7 +20838,7 @@

    High Risk (RM7x7 S:7 L:3)

    - + @@ -26991,23 +20871,23 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S7L3RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27035,7 +20915,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + @@ -27068,23 +20948,23 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S7L4RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27112,7 +20992,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -27145,23 +21025,23 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S7L5RM7x7S6L7 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27189,7 +21069,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -27222,23 +21102,23 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S7L6RM7x7S7L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27266,7 +21146,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -27299,55 +21179,42 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Sabotage

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S7L7RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + - + - - - - - - - - - + + @@ -27356,17 +21223,14 @@

    Sabotage

    - + - - - - + @@ -27383,7 +21247,7 @@

    Sabotage

    - @@ -27392,55 +21256,42 @@

    Sabotage

    -
    -

    Scam

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermSabotageRM7x7S7L3 Prefix risk
    LabelSabotageHigh Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#RM7x7S7L3
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSabotageNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27449,17 +21300,14 @@

    Scam

    - + - - - - + @@ -27476,7 +21324,7 @@

    Scam

    - @@ -27485,53 +21333,42 @@

    Scam

    -
    -

    Security Breach

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermScamRM7x7S7L4 Prefix risk
    LabelScamVery High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#RM7x7S7L4
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionScamNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27540,17 +21377,14 @@

    Security Breach

    - + - - - - + @@ -27567,7 +21401,7 @@

    Security Breach

    - @@ -27576,59 +21410,42 @@

    Security Breach

    - - - - - -
    -

    Service Interruption

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermSecurityBreachRM7x7S7L5 Prefix risk
    LabelSecurity BreachExtremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#RM7x7S7L5
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSecurity BreachNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27637,17 +21454,14 @@

    Service Interruption

    - + - - - - + @@ -27664,7 +21478,7 @@

    Service Interruption

    - @@ -27673,55 +21487,42 @@

    Service Interruption

    -
    -

    Sexual Violence

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermServiceInterruptionRM7x7S7L6 Prefix risk
    LabelService InterruptionExtremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#ServiceInterruptionhttps://w3id.org/dpv/risk#RM7x7S7L6
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionService InterruptionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27730,17 +21531,14 @@

    Sexual Violence

    - + - - - - + @@ -27757,7 +21555,7 @@

    Sexual Violence

    - @@ -27766,47 +21564,40 @@

    Sexual Violence

    -
    -

    Share Risk

    +
    +

    Sabotage

    TermSexualViolenceRM7x7S7L7 Prefix risk
    LabelSexual ViolenceExtremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#RM7x7S7L7
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSexual ViolenceNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -27815,22 +21606,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -27839,7 +21636,7 @@

    Share Risk

    - @@ -27848,53 +21645,40 @@

    Share Risk

    -
    -

    Social Disadvantage

    +
    +

    Scam

    TermShareRiskSabotage Prefix risk
    LabelShare RiskSabotage
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27903,25 +21687,31 @@

    Social Disadvantage

    - + - + + + + - + - + + + + - + @@ -27936,47 +21726,40 @@

    Social Disadvantage

    -
    -

    Source Control

    +
    +

    Security Attack

    TermSocialDisadvantageScam Prefix risk
    LabelSocial DisadvantageScam
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSocial DisadvantageSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -27985,7 +21768,7 @@

    Source Control

    - + @@ -27996,20 +21779,14 @@

    Source Control

    - - - - + - - - - + - @@ -28018,55 +21795,40 @@

    Source Control

    -
    -

    Spam

    +
    +

    Security Breach

    TermSourceControlSecurityAttack Prefix risk
    LabelSource ControlSecurity Attack
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28075,7 +21837,7 @@

    Spam

    - + @@ -28084,7 +21846,7 @@

    Spam

    - + @@ -28093,7 +21855,10 @@

    Spam

    - + + + + @@ -28111,55 +21876,44 @@

    Spam

    -
    -

    Spoofing

    + + + + + +
    +

    Sexual Violence

    TermSpamSecurityBreach Prefix risk
    LabelSpamSecurity Breach
    IRIhttps://w3id.org/dpv/risk#Spamhttps://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpamSomething that acts as or causes Security Breach
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28168,7 +21922,7 @@

    Spoofing

    - + @@ -28177,7 +21931,7 @@

    Spoofing

    - + @@ -28186,7 +21940,10 @@

    Spoofing

    - + + + + @@ -28204,53 +21961,45 @@

    Spoofing

    -
    -

    Spying

    +
    +

    Share Risk

    TermSpoofingSexualViolence Prefix risk
    LabelSpoofingSexual Violence
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpoofingSomething that acts as or causes Sexual Violence
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28261,23 +22010,20 @@

    Spying

    - + - - - - + - + @@ -28288,7 +22034,7 @@

    Spying

    - @@ -28297,55 +22043,40 @@

    Spying

    -
    -

    Stalking

    +
    +

    Social Disadvantage

    TermSpyingShareRisk Prefix risk
    LabelSpyingShare Risk
    IRIhttps://w3id.org/dpv/risk#Spyinghttps://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSpyingRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28354,28 +22085,28 @@

    Stalking

    - + - - - - + - + - + + + + - + @@ -28390,85 +22121,59 @@

    Stalking

    -
    -

    System Failure

    +
    +

    Societal Health & Safety

    TermStalkingSocialDisadvantage Prefix risk
    LabelStalkingSocial Disadvantage
    IRIhttps://w3id.org/dpv/risk#Stalkinghttps://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionStalkingSomething that acts as or causes Social Disadvantage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -28482,54 +22187,39 @@

    System Failure

    -
    -

    System Intrusion

    +
    +

    Societal Risk

    TermSystemFailureSocietalHealthSafety Prefix risk
    LabelSystem FailureSocietal Health & Safety
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem Failure
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28538,29 +22228,20 @@

    System Intrusion

    - + - - - - + - - - - + - - - - + @@ -28574,52 +22255,45 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Source Control

    TermSystemIntrusionSocietalRisk Prefix risk
    LabelSystem IntrusionSocietal Risk
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem IntrusionRisks and issues that affect or have the potential to affect society at large or specific groups in society
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28630,23 +22304,20 @@

    System Malfunction

    - + - - - - + - + @@ -28657,7 +22328,7 @@

    System Malfunction

    - @@ -28666,55 +22337,44 @@

    System Malfunction

    -
    -

    Terrorism

    +
    +

    Spoofing

    TermSystemMalfunctionSourceControl Prefix risk
    LabelSystem MalfunctionSource Control
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSystem MalfunctionRisk Mitigation Measure that controls the Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - - - - - + + @@ -28723,7 +22383,7 @@

    Terrorism

    - + @@ -28732,7 +22392,7 @@

    Terrorism

    - + @@ -28741,7 +22401,10 @@

    Terrorism

    - + + + + @@ -28759,55 +22422,40 @@

    Terrorism

    -
    -

    Theft

    +
    +

    System Failure

    TermTerrorismSpoofing Prefix risk
    LabelTerrorismSpoofing
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTerrorismSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28816,16 +22464,19 @@

    Theft

    - + - + + + + - + @@ -28834,7 +22485,10 @@

    Theft

    - + + + + @@ -28852,55 +22506,40 @@

    Theft

    -
    -

    Theft of Equipment

    +
    +

    System Intrusion

    TermTheftSystemFailure Prefix risk
    LabelTheftSystem Failure
    IRIhttps://w3id.org/dpv/risk#Thefthttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheftSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28909,7 +22548,7 @@

    Theft of Equipment

    - + @@ -28918,7 +22557,7 @@

    Theft of Equipment

    - + @@ -28927,7 +22566,10 @@

    Theft of Equipment

    - + + + + @@ -28945,55 +22587,40 @@

    Theft of Equipment

    -
    -

    Theft of Media

    +
    +

    System Malfunction

    TermTheftEquipmentSystemIntrusion Prefix risk
    LabelTheft of EquipmentSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#TheftEquipmenthttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of EquipmentSomething that acts as or causes System Intrusion
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29002,9 +22629,12 @@

    Theft of Media

    - + - + + + + @@ -29020,7 +22650,10 @@

    Theft of Media

    - + + + + @@ -29038,54 +22671,40 @@

    Theft of Media

    -
    -

    Third Party Operation Disruption

    +
    +

    Terrorism

    TermTheftMediaSystemMalfunction Prefix risk
    LabelTheft of MediaSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#TheftMediahttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of MediaSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29094,7 +22713,7 @@

    Third Party Operation Disruption

    - + @@ -29112,7 +22731,10 @@

    Third Party Operation Disruption

    - + + + + @@ -29158,6 +22780,7 @@

    Threat

    @@ -29305,31 +22928,17 @@

    Unauthorised Access to Premises

    - + - - - - - - - - - + + @@ -29338,7 +22947,7 @@

    Unauthorised Access to Premises

    - + @@ -29356,7 +22965,10 @@

    Unauthorised Access to Premises

    - + + + + @@ -29374,54 +22986,40 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Code Access

    +
    +

    Unauthorised Activity

    TermThirdPartyOperationDisruptionTerrorism Prefix risk
    LabelThird Party Operation DisruptionTerrorism
    IRIhttps://w3id.org/dpv/risk#ThirdPartyOperationDisruptionhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionThird Party Operation DisruptionSomething that acts as or causes Terrorism
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Broader/Parent types risk:RiskSource + → dpv:RiskConcept
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Access to PremisesSomething that acts as or causes Unauthorised Access to Premises
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29430,29 +23028,20 @@

    Unauthorised Code Access

    - + - - - - + - - - - + - - - - + @@ -29466,54 +23055,40 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Unauthorised Code Access

    TermUnauthorisedCodeAccessUnauthorisedActivity Prefix risk
    LabelUnauthorised Code AccessUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code AccessSomething that acts as or causes Unauthorised Activity
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29522,7 +23097,7 @@

    Unauthorised Code Disclosure

    - + @@ -29540,7 +23115,10 @@

    Unauthorised Code Disclosure

    - + + + + @@ -29558,54 +23136,40 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Unauthorised Code Disclosure

    TermUnauthorisedCodeDisclosureUnauthorisedCodeAccess Prefix risk
    LabelUnauthorised Code DisclosureUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code DisclosureSomething that acts as or causes Unauthorised Code Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29614,7 +23178,7 @@

    Unauthorised Code Modification

    - + @@ -29632,7 +23196,10 @@

    Unauthorised Code Modification

    - + + + + @@ -29650,54 +23217,40 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Unauthorised Code Modification

    TermUnauthorisedCodeModificationUnauthorisedCodeDisclosure Prefix risk
    LabelUnauthorised Code ModificationUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code ModificationSomething that acts as or causes Unauthorised Code Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29706,7 +23259,7 @@

    Unauthorised Data Access

    - + @@ -29715,7 +23268,7 @@

    Unauthorised Data Access

    - + @@ -29724,7 +23277,10 @@

    Unauthorised Data Access

    - + + + + @@ -29742,54 +23298,40 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Unauthorised Data Access

    TermUnauthorisedDataAccessUnauthorisedCodeModification Prefix risk
    LabelUnauthorised Data AccessUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data AccessSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29798,7 +23340,7 @@

    Unauthorised Data Disclosure

    - + @@ -29807,7 +23349,7 @@

    Unauthorised Data Disclosure

    - + @@ -29816,7 +23358,10 @@

    Unauthorised Data Disclosure

    - + + + + @@ -29834,55 +23379,40 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Unauthorised Data Disclosure

    TermUnauthorisedDataDisclosureUnauthorisedDataAccess Prefix risk
    LabelUnauthorised Data DisclosureUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data DisclosureSomething that acts as or causes Unauthorised Data Access
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29891,7 +23421,7 @@

    Unauthorised Data Modification

    - + @@ -29900,7 +23430,7 @@

    Unauthorised Data Modification

    - + @@ -29909,7 +23439,10 @@

    Unauthorised Data Modification

    - + + + + @@ -29927,55 +23460,40 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Impersonation

    +
    +

    Unauthorised Data Modification

    TermUnauthorisedDataModificationUnauthorisedDataDisclosure Prefix risk
    LabelUnauthorised Data ModificationUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data ModificationSomething that acts as or causes Unauthorised Data Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29984,7 +23502,7 @@

    Unauthorised Impersonation

    - + @@ -29993,7 +23511,7 @@

    Unauthorised Impersonation

    - + @@ -30002,7 +23520,10 @@

    Unauthorised Impersonation

    - + + + + @@ -30043,31 +23564,17 @@

    Unauthorised Information Disclosure

    - + - - - - - - - - - + + @@ -30076,7 +23583,7 @@

    Unauthorised Information Disclosure

    - + @@ -30094,7 +23601,10 @@

    Unauthorised Information Disclosure

    - + + + + @@ -30135,31 +23645,17 @@

    Unauthorised Re-Identification

    - + - - - - - - - - - + + @@ -30168,7 +23664,7 @@

    Unauthorised Re-Identification

    - + @@ -30183,7 +23679,10 @@

    Unauthorised Re-Identification

    - + + + + @@ -30224,31 +23723,17 @@

    Unauthorised Resource Use

    - + - - - - - - - - - + + @@ -30257,7 +23742,7 @@

    Unauthorised Resource Use

    - + @@ -30275,7 +23760,10 @@

    Unauthorised Resource Use

    - + + + + @@ -30316,31 +23804,17 @@

    Unauthorised System Access

    - + - - - - - - - - - + + @@ -30349,7 +23823,7 @@

    Unauthorised System Access

    - + @@ -30367,7 +23841,10 @@

    Unauthorised System Access

    - + + + + @@ -30408,31 +23885,17 @@

    Unauthorised System Modification

    - + - - - - - - - - - + + @@ -30441,7 +23904,7 @@

    Unauthorised System Modification

    - + @@ -30459,99 +23922,10 @@

    Unauthorised System Modification

    - - - - - - - - - - - - -
    TermUnauthorisedImpersonationUnauthorisedDataModification Prefix risk
    LabelUnauthorised ImpersonationUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedImpersonationhttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised ImpersonationSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Information DisclosureSomething that acts as or causes Unauthorised Information Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Reidentification - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Re-IdentificationSomething that acts as or causes Unauthorised Re-Identification
    Date Created 2022-08-19
    Date Modified2024-08-16
    Contributors Georg P. Krog
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Resource UseSomething that acts as or causes Unauthorised Resource Use
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System AccessSomething that acts as or causes Unauthorised System Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System ModificationSomething that acts as or causes Unauthorised System Modification
    Date Created 2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Unknown Vulnerability Exploited

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + - - - - - - - - @@ -30592,31 +23966,17 @@

    Unwanted Code Deletion

    - + - - - - - - - - - + + @@ -30625,7 +23985,7 @@

    Unwanted Code Deletion

    - + @@ -30643,7 +24003,10 @@

    Unwanted Code Deletion

    - + + + + @@ -30684,31 +24047,17 @@

    Unwanted Data Deletion

    - + - - - - - - - - - - - + + + + + @@ -30717,7 +24066,7 @@

    Unwanted Data Deletion

    - + @@ -30735,7 +24084,10 @@

    Unwanted Data Deletion

    - + + + + @@ -30776,31 +24128,17 @@

    Unwanted Disclosure of Data

    - + - - - - - - - - - + + @@ -30809,7 +24147,7 @@

    Unwanted Disclosure of Data

    - + @@ -30827,7 +24165,10 @@

    Unwanted Disclosure of Data

    - + + + + @@ -30845,54 +24186,39 @@

    Unwanted Disclosure of Data

    -
    -

    Vandalism

    +
    +

    User Risks

    TermUnknownVulnerabilityExploitedPrefixrisk
    LabelUnknown Vulnerability Exploited
    IRIhttps://w3id.org/dpv/risk#UnknownVulnerabilityExploited
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnknown Vulnerability Exploited
    SourceENISA Reference Incident Classification Taxonomy 2018Date Modified2024-08-16
    Date Created2022-08-17
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Code DeletionSomething that acts as or causes Unwanted Code Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionUnwanted Data DeletionSomething that acts as or causes Unwanted Data Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Disclosure of DataSomething that acts as or causes Unwanted Disclosure of Data
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -30901,29 +24227,20 @@

    Vandalism

    - + - - - - + - - - - + - - - - + @@ -31453,54 +24770,40 @@

    Very Low Severity

    -
    -

    Violation of Code of Conduct

    +
    +

    Violating Code of Conduct

    TermVandalismUserRisks Prefix risk
    LabelVandalismUser Risks
    IRIhttps://w3id.org/dpv/risk#Vandalismhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVandalismConcepts associated with risks that arise due to User or Human use
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31509,9 +24812,12 @@

    Violation of Code of Conduct

    - + - + + + + @@ -31527,7 +24833,10 @@

    Violation of Code of Conduct

    - + + + + @@ -31545,54 +24854,40 @@

    Violation of Code of Conduct

    -
    -

    Violation of Contractual Obligations

    +
    +

    Violation of Contractual Obligation

    TermViolationCodeConductViolatingCodeOfConduct Prefix risk
    LabelViolation of Code of ConductViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#ViolationCodeConducthttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Code of ConductSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31601,9 +24896,12 @@

    Violation of Contractual Obligations

    - + - + + + + @@ -31619,7 +24917,10 @@

    Violation of Contractual Obligations

    - + + + + @@ -31637,54 +24938,40 @@

    Violation of Contractual Obligations

    -
    -

    Violation of Ethical Code

    +
    +

    Violating Ethics Code

    TermViolationContractualObligationsViolatingContractualObligation Prefix risk
    LabelViolation of Contractual ObligationsViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#ViolationContractualObligationshttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Contractual ObligationsSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31693,9 +24980,12 @@

    Violation of Ethical Code

    - + - + + + + @@ -31711,7 +25001,10 @@

    Violation of Ethical Code

    - + + + + @@ -31729,55 +25022,40 @@

    Violation of Ethical Code

    -
    -

    Violation of Rights

    +
    +

    Violation of Legal Obligations

    TermViolationEthicalCodeViolatingEthicsCode Prefix risk
    LabelViolation of Ethical CodeViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#ViolationEthicalCodehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Ethical CodeSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31786,25 +25064,34 @@

    Violation of Rights

    - + - + + + + - + + + + - + - + + + + - + @@ -31819,54 +25106,40 @@

    Violation of Rights

    -
    -

    Violation of Regulatory Obligations

    +
    +

    Violating Policy

    TermViolationOfRightsViolatingLegalObligation Prefix risk
    LabelViolation of RightsViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ViolationOfRightshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of RightsSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31875,29 +25148,20 @@

    Violation of Regulatory Obligations

    - + - - - - + - - - - + - - - - + @@ -31911,13 +25175,13 @@

    Violation of Regulatory Obligations

    -
    +

    Violation of Statutory Obligations

    TermViolationRegulatoryObligationsViolatingPolicy Prefix risk
    LabelViolation of Regulatory ObligationsViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolationRegulatoryObligationshttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Regulatory ObligationsSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + @@ -31927,38 +25191,24 @@

    Violation of Statutory Obligations

    - + - + - - - - - - - - - + + @@ -31967,9 +25217,12 @@

    Violation of Statutory Obligations

    - + - + + + + @@ -31985,7 +25238,10 @@

    Violation of Statutory Obligations

    - + + + + @@ -32002,47 +25258,40 @@

    Violation of Statutory Obligations

    -
    -

    Vulnerability

    + +
    +

    Violence against children

    TermViolationStatutoryObligationsViolatingStatutoryObligations Prefix risk
    IRIhttps://w3id.org/dpv/risk#ViolationStatutoryObligationshttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Statutory ObligationsSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + + + + - - - - - - - - - + + @@ -32051,28 +25300,40 @@

    Vulnerability

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -32080,53 +25341,45 @@

    Vulnerability

    - -
    -

    Vulnerability Created

    +
    +

    Vulnerability

    TermVulnerabilityViolenceAgainstChildren Prefix risk
    LabelVulnerabilityViolence against children
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk +
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - + - - @@ -32137,34 +25390,28 @@

    Vulnerability Created

    - + - - - - - + + - + - - - - + - @@ -32173,54 +25420,40 @@

    Vulnerability Created

    -
    -

    Vulnerability Exploited

    +
    +

    Vulnerability Created

    TermVulnerabilityCreatedVulnerability Prefix risk
    LabelVulnerability CreatedVulnerability
    IRIhttps://w3id.org/dpv/risk#VulnerabilityCreatedhttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource + risk:isExploitedBy, + risk:isVulnerabilityOf
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability
    DefinitionVulnerability CreatedIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - + + @@ -32229,7 +25462,7 @@

    Vulnerability Exploited

    - + @@ -32238,7 +25471,7 @@

    Vulnerability Exploited

    - + @@ -32247,7 +25480,10 @@

    Vulnerability Exploited

    - + + + + @@ -32378,84 +25614,6 @@

    Properties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32653,18 +25811,6 @@

    caused by vulnerability

    - - - - - - - - - - - - @@ -32693,54 +25839,6 @@

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32871,15 +25969,6 @@

    exploits vulnerability

    - - - - - - - - - @@ -33275,6 +26364,8 @@

    has vulnerability

    + + @@ -33287,15 +26378,6 @@

    has vulnerability

    - - - - - - - - - @@ -33487,72 +26569,21 @@

    is vulnerability of

    - - - - - - - - - - - - -
    TermVulnerabilityExploitedVulnerabilityCreated Prefix risk
    LabelVulnerability ExploitedVulnerability Created
    IRIhttps://w3id.org/dpv/risk#VulnerabilityExploitedhttps://w3id.org/dpv/risk#VulnerabilityCreated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:InternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVulnerability ExploitedSomething that acts as or causes Vulnerability Created
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + Date Created + 2024-02-14 + + + + + + + See More: + section CORE in RISK + + + + +
    @@ -34194,24 +27225,6 @@

    refers to risk

    - - - - - - - - - - - - - - - - - - @@ -34323,81 +27336,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34423,17 +27361,9 @@

    External

    - - - - - - - - @@ -34445,7 +27375,6 @@

    External

    - @@ -34454,17 +27383,14 @@

    External

    - - - @@ -34491,12 +27417,9 @@

    External

    - - - @@ -34510,59 +27433,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34577,10 +27447,6 @@

    External

    - - - - @@ -34589,11 +27455,6 @@

    External

    - - - - - @@ -34617,7 +27478,6 @@

    External

    - @@ -34659,26 +27519,20 @@

    External

    - - - - - - @@ -34767,46 +27621,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34815,10 +27629,6 @@

    External

    - - - - @@ -34830,10 +27640,8 @@

    External

    - - @@ -35280,28 +28088,13 @@

    External

    - - - - - - - - - - - - - - - @@ -35430,9 +28223,6 @@

    External

    - - - diff --git a/2.1-dev/risk/modules/core-owl.jsonld b/2.1-dev/risk/modules/core-owl.jsonld index f2c798d4d..9554f2273 100644 --- a/2.1-dev/risk/modules/core-owl.jsonld +++ b/2.1-dev/risk/modules/core-owl.jsonld @@ -1,29 +1,30 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -35,35 +36,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "http://purl.org/dc/terms/created": [ @@ -86,35 +77,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" + "@value": "caused by threat" } ], - "https://schema.org/domainIncludes": [ + "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -137,42 +128,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "exploits vulnerability" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -180,11 +170,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -194,18 +179,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -213,7 +203,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-06-12" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -235,30 +231,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://purl.org/dc/terms/created": [ @@ -267,11 +258,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -286,36 +272,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" + "@value": "has control" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -328,6 +304,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -337,30 +318,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], "http://purl.org/dc/terms/created": [ @@ -383,116 +364,104 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Threat", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Risk source event which causes Risk" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-02-14" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -502,7 +471,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -514,136 +483,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b3cb59e522845058c138349bfaee11f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N2b3cb59e522845058c138349bfaee11f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -651,11 +520,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -665,61 +529,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "is exploited by" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/rangeIncludes": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://w3id.org/dpv/owl#Risk" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://purl.org/dc/terms/created": [ @@ -742,95 +585,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" + "@value": "has risk source" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://w3id.org/dpv/owl#Risk" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, @@ -849,150 +620,58 @@ "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "caused by vulnerability" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Risk Concepts - N3 serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], "http://purl.org/dc/terms/bibliographicCitation": [ { @@ -1011,17 +690,17 @@ } ], "http://purl.org/dc/terms/contributor": [ - { - "@value": "Julio Fernandez" - }, { "@value": "Rob Brennan" }, { - "@value": "Harshvardhan J. Pandit" + "@value": "Julio Fernandez" }, { "@value": "Delaram Golpayegani" + }, + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -1033,11 +712,11 @@ "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Rob Brennan" + "@value": "Delaram Golpayegani" }, { "@language": "en", - "@value": "Paul Ryan" + "@value": "Beatriz Esteves" }, { "@language": "en", @@ -1045,19 +724,19 @@ }, { "@language": "en", - "@value": "Delaram Golpayegani" + "@value": "Rob Brennan" }, { "@language": "en", - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" }, { "@language": "en", - "@value": "Beatriz Esteves" + "@value": "Paul Ryan" }, { "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/description": [ @@ -1146,9 +825,15 @@ } ], "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/guides" + }, { "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, { "@id": "https://w3id.org/dpv/examples" }, @@ -1156,40 +841,236 @@ "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" }, { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/primer" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" }, { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/owl" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAssessment", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Matrix" + } + ] + }, + { + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Vulnerability" } ] }, @@ -1225,15 +1106,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAssessment", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -1242,21 +1122,11 @@ "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1266,29 +1136,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" + "@value": "caused by vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, @@ -1339,50 +1198,65 @@ ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/owl#Incident" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://w3id.org/dpv/owl#Risk" } ], "http://purl.org/dc/terms/created": [ @@ -1391,6 +1265,11 @@ "@value": "2024-02-14" } ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1405,28 +1284,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" + "@value": "refers to risk" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/owl#Incident" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://w3id.org/dpv/owl#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -1444,7 +1323,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1456,13 +1335,146 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Threat" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "An actual or occured event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N837e146fba804365b9e619c05849f3d1" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Analysis" + } + ] + }, + { + "@id": "_:N837e146fba804365b9e619c05849f3d1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" } ] } diff --git a/2.1-dev/risk/modules/core-owl.n3 b/2.1-dev/risk/modules/core-owl.n3 index 9b5b12a75..37ca79a9a 100644 --- a/2.1-dev/risk/modules/core-owl.n3 +++ b/2.1-dev/risk/modules/core-owl.n3 @@ -20,10 +20,11 @@ risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex-owl:E0069, dex-owl:E0070 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "An actual or occured event"@en ; skos:prefLabel "Incident"@en ; @@ -79,8 +80,9 @@ risk-owl:RiskMatrix a rdfs:Class, risk-owl:RiskSource a rdfs:Class, owl:Class ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:prefLabel "Risk Source"@en . diff --git a/2.1-dev/risk/modules/core-owl.rdf b/2.1-dev/risk/modules/core-owl.rdf index 0ac91f24d..4a19df2d8 100644 --- a/2.1-dev/risk/modules/core-owl.rdf +++ b/2.1-dev/risk/modules/core-owl.rdf @@ -13,360 +13,362 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > + + + + Risk source event which causes Risk + + 2024-02-14 + accepted + + Threat + + + 2024-02-14 + + + Indicates the cause of associated context (subject) was the indicated threat (object) + accepted + + caused by threat + + + - - - - Julio Fernandez + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev + https://w3id.org/dpv/risk# Rob Brennan - Harshvardhan J. Pandit + Julio Fernandez Delaram Golpayegani + Harshvardhan J. Pandit + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + - - - - https://w3id.org/dpv/risk# - http://purl.org/ontology/bibo/status/published - - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit + 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 + 10.5281/zenodo.12505841 - https://w3id.org/dpv/risk - 2.1-dev - risk http://www.w3.org/2004/02/skos/core http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + 2022-08-14 + http://purl.org/ontology/bibo/status/published Risk Concepts - - - - - 2024-02-14 - accepted - - - - exploits vulnerability - - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - - Primer for Data Privacy Vocabulary - - - - + RISK + + + risk - - + - Risk Concepts - RDF/XML serialiation + + Risk Concepts - RDF/XML serialiation - - 2024-02-14 - ISO 31073:2022 Risk management vocabulary - Assessment of risk involving its identification, analysis, and evaluation - accepted + + + + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + Vulnerability + - + accepted + 2024-02-14 + + + - Risk Assessment + + + Risk Matrix + 2024-02-14 + Harshvardhan J. Pandit + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + accepted + - - Indicates the use of specified control + + + accepted + + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) 2024-02-14 - has control + + + + + Indicates the associated context (subject) has indicated vulnerability (object) + + has vulnerability + + - - accepted + 2024-02-14 - - is vulnerability of - + - 2024-02-14 - - Indicates the vulnerability (subject) is associated with indicated context (object) - + has control accepted + + + 2024-02-14 + + Indicates the use of specified control + Risk Source + accepted + - 2024-02-14 - Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - + 2024-02-14 + 2024-08-16 + + + + + 2022-08-18 accepted + + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + Harshvardhan J. Pandit - - Examples for Data Privacy Vocabulary - - - - - - - + + is vulnerability of + accepted + 2024-02-14 + + + Indicates the vulnerability (subject) is associated with indicated context (object) - Indicates the risk (subject) has the indicated risk source (object) - - - 2024-02-14 - has risk source - - accepted - - - - Risk Concepts - N3 serialiation - - - - + + https://www.iso.org/standard/72140.html + + IEC 31010:2019 - - Risk source event which causes Risk - - Threat + + + + + + + accepted + Indicates the threat (subject) exploits the indicated vulnerability (object) + exploits vulnerability + + 2024-02-14 + + + + + + Threat Source accepted + 2024-02-14 + Source of threat event, including both agent and non-agent sources + + + ISO 31073:2022 Risk management vocabulary - - + Risk Assessment + + Assessment of risk involving its identification, analysis, and evaluation accepted - Vulnerability 2024-02-14 - - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - - + Risk Concepts - Turtle serialiation - + - + + has risk source + - - 2024-02-14 - - caused by threat - accepted - Indicates the cause of associated context (subject) was the indicated threat (object) - - - Harshvardhan J. Pandit - - - - 2024-02-14 - Risk Matrix + + accepted - - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - + 2024-02-14 + + Indicates the risk (subject) has the indicated risk source (object) - accepted + + 2024-02-14 + has incident Indicates an incident is associated with the specified context - 2024-02-14 - - has incident + accepted - - Guides for Data Privacy Vocabulary - - - - - - - accepted - 2024-06-12 + accepted + + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk Risk Management ISO 31073:2022 Risk management vocabulary - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - - Incident is realised or materialised risk - An actual or occured event - - - 2024-02-14 - Incident - - - accepted + + + + + + Risk Concepts - JSON-LD serialiation + - - - refers to risk - - - 2024-02-14 - - - - - - accepted - Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + Risk Concepts - N3 serialiation + + + + + + 2024-02-14 + - 2024-02-14 - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - is exploited by - - - accepted - - - - - - - Risk Concepts - JSON-LD serialiation - - - - - - - Source of threat event, including both agent and non-agent sources - 2024-02-14 - accepted - - Threat Source - - - - Indicates the associated context (subject) has indicated vulnerability (object) + is exploited by accepted - - - has vulnerability - - - 2024-02-14 + - + 2024-02-14 + + + has threat source + Indicates the threat (subject) has the indicated source (object) - Indicates the threat (subject) has the indicated source (object) accepted - has threat source - - - - Risk Concepts - HTML serialiation - - - - - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html - + + + Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - caused by vulnerability + + refers to risk + + + accepted 2024-02-14 - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - accepted + - - Harshvardhan J. Pandit + + 2024-08-16 - 2022-08-18 - - Risk Analysis - - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez accepted + Incident is realised or materialised risk + 2024-02-14 + + + Incident + An actual or occured event + - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 + + + + Examples for Data Privacy Vocabulary + + + - - IEC 31010:2019 - - https://www.iso.org/standard/72140.html + + Guides for Data Privacy Vocabulary + + + + + + + + + + + + + Primer for Data Privacy Vocabulary + + + + + Risk Concepts - HTML serialiation + + + diff --git a/2.1-dev/risk/modules/core-owl.ttl b/2.1-dev/risk/modules/core-owl.ttl index 9b5b12a75..37ca79a9a 100644 --- a/2.1-dev/risk/modules/core-owl.ttl +++ b/2.1-dev/risk/modules/core-owl.ttl @@ -20,10 +20,11 @@ risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex-owl:E0069, dex-owl:E0070 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "An actual or occured event"@en ; skos:prefLabel "Incident"@en ; @@ -79,8 +80,9 @@ risk-owl:RiskMatrix a rdfs:Class, risk-owl:RiskSource a rdfs:Class, owl:Class ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:prefLabel "Risk Source"@en . diff --git a/2.1-dev/risk/modules/core.csv b/2.1-dev/risk/modules/core.csv index 2c10a0d7f..e43120008 100644 --- a/2.1-dev/risk/modules/core.csv +++ b/2.1-dev/risk/modules/core.csv @@ -1,21 +1,21 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,,,Incident is realised or materialised risk,2024-02-14,,risk,https://w3id.org/dpv/risk -RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk -RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk -RiskManagement,class,https://w3id.org/dpv/risk#RiskManagement,Risk Management,"Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk",,,,,2024-06-12,,risk,https://w3id.org/dpv/risk -RiskMatrix,class,https://w3id.org/dpv/risk#RiskMatrix,Risk Matrix,Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.,https://w3id.org/dpv/risk#RiskAssessment,,https://w3id.org/dpv/risk#RiskAssessment,,2024-02-14,,risk,https://w3id.org/dpv/risk -RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk -ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -exploitsVulnerability,property,https://w3id.org/dpv/risk#exploitsVulnerability,exploits vulnerability,Indicates the threat (subject) exploits the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasControl,property,https://w3id.org/dpv/risk#hasControl,has control,Indicates the use of specified control,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasIncident,property,https://w3id.org/dpv/risk#hasIncident,has incident,Indicates an incident is associated with the specified context,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasRiskSource,property,https://w3id.org/dpv/risk#hasRiskSource,has risk source,Indicates the risk (subject) has the indicated risk source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasThreatSource,property,https://w3id.org/dpv/risk#hasThreatSource,has threat source,Indicates the threat (subject) has the indicated source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasVulnerability,property,https://w3id.org/dpv/risk#hasVulnerability,has vulnerability,Indicates the associated context (subject) has indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -isExploitedBy,property,https://w3id.org/dpv/risk#isExploitedBy,is exploited by,Indicates the vulnerability (subject) is exploited by the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -isVulnerabilityOf,property,https://w3id.org/dpv/risk#isVulnerabilityOf,is vulnerability of,Indicates the vulnerability (subject) is associated with indicated context (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -refersToRisk,property,https://w3id.org/dpv/risk#refersToRisk,refers to risk,Indicates the incident (subject) is a materialisation of the indicated risk (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk +RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk +RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk +RiskManagement,class,https://w3id.org/dpv/risk#RiskManagement,Risk Management,"Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk",,,,,2024-06-12,,risk,https://w3id.org/dpv/risk +RiskMatrix,class,https://w3id.org/dpv/risk#RiskMatrix,Risk Matrix,Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.,https://w3id.org/dpv/risk#RiskAssessment,,https://w3id.org/dpv/risk#RiskAssessment,,2024-02-14,,risk,https://w3id.org/dpv/risk +RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk +Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk +ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +exploitsVulnerability,property,https://w3id.org/dpv/risk#exploitsVulnerability,exploits vulnerability,Indicates the threat (subject) exploits the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasControl,property,https://w3id.org/dpv/risk#hasControl,has control,Indicates the use of specified control,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasIncident,property,https://w3id.org/dpv/risk#hasIncident,has incident,Indicates an incident is associated with the specified context,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasRiskSource,property,https://w3id.org/dpv/risk#hasRiskSource,has risk source,Indicates the risk (subject) has the indicated risk source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasThreatSource,property,https://w3id.org/dpv/risk#hasThreatSource,has threat source,Indicates the threat (subject) has the indicated source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasVulnerability,property,https://w3id.org/dpv/risk#hasVulnerability,has vulnerability,Indicates the associated context (subject) has indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +isExploitedBy,property,https://w3id.org/dpv/risk#isExploitedBy,is exploited by,Indicates the vulnerability (subject) is exploited by the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +isVulnerabilityOf,property,https://w3id.org/dpv/risk#isVulnerabilityOf,is vulnerability of,Indicates the vulnerability (subject) is associated with indicated context (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +refersToRisk,property,https://w3id.org/dpv/risk#refersToRisk,refers to risk,Indicates the incident (subject) is a materialisation of the indicated risk (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/core.jsonld b/2.1-dev/risk/modules/core.jsonld index 338ea2c08..b413598bd 100644 --- a/2.1-dev/risk/modules/core.jsonld +++ b/2.1-dev/risk/modules/core.jsonld @@ -1,64 +1,216 @@ [ { - "@id": "https://w3id.org/dpv/risk#hasIncident", + "@id": "https://w3id.org/dpv/risk#core-classes", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "accepted" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "has incident" + "@value": "2024-07-13" } ], - "https://schema.org/rangeIncludes": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#causedByThreat", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/terms/created": [ @@ -81,7 +233,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -92,38 +244,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "caused by threat" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-06-12" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -145,7 +290,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -156,13 +301,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Risk Management" } ] }, @@ -218,19 +357,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv#Incident" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv#Risk" } ], "http://purl.org/dc/terms/created": [ @@ -239,6 +378,11 @@ "@value": "2024-02-14" } ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -253,7 +397,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -264,40 +408,45 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "refers to risk" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv#Incident" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/risk#hasRiskSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -309,116 +458,90 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "has risk source" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/rangeIncludes": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv#RiskConcept" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Risk Concepts - N3 serialiation" + "@language": "en", + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#hasThreatSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" @@ -430,7 +553,7 @@ ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], "http://purl.org/dc/terms/created": [ @@ -453,7 +576,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -464,7 +587,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" + "@value": "has threat source" } ], "https://schema.org/domainIncludes": [ @@ -474,71 +597,61 @@ ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "caused by threat" + "@id": "https://w3id.org/dpv/primer" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N837e146fba804365b9e619c05849f3d1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -548,7 +661,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -557,10 +670,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -571,30 +689,55 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "_:N837e146fba804365b9e619c05849f3d1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Incident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, { - "@id": "_:N2b3cb59e522845058c138349bfaee11f" + "@id": "https://w3id.org/dpv/examples#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -604,7 +747,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -615,13 +758,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -632,40 +775,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N2b3cb59e522845058c138349bfaee11f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" + "@value": "Incident" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Incident" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -674,11 +802,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -693,7 +816,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -704,81 +827,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "caused by vulnerability" } ], - "https://schema.org/domainIncludes": [ + "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv#Incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ThreatSource", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Threat Source" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -801,7 +867,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -812,221 +878,148 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "is vulnerability of" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Julio Fernandez" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/title": [ { - "@value": "https://w3id.org/dpv/risk" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/examples" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "2024-07-13" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://www.w3.org/" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Risk Concepts" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/ontology/bibo/status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://purl.org/dc/terms/format": [ { - "@value": "risk" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://purl.org/dc/terms/title": [ { - "@value": "https://w3id.org/dpv/risk#" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "RISK" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "2.1-dev" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "https://schema.org/version": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ @@ -1049,7 +1042,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1060,23 +1053,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" + "@value": "has incident" } ], - "https://schema.org/domainIncludes": [ + "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", + "@id": "https://w3id.org/dpv/risk#ThreatSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1087,12 +1074,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1100,7 +1081,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1109,15 +1090,10 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskManagement" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1128,52 +1104,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TR/turtle/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Risk Concepts - Turtle serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://www.w3.org/TR/json-ld11/" } ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1185,6 +1187,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1194,28 +1201,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1223,7 +1225,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ @@ -1239,7 +1241,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1248,10 +1250,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskManagement" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1262,51 +1269,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/risk#hasVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -1315,11 +1290,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1331,73 +1301,87 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "IEC 31010:2019" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@language": "en", + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, @@ -1463,81 +1447,118 @@ ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAssessment" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/source": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Matrix" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - HTML serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://purl.org/dc/terms/created": [ @@ -1560,7 +1581,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1571,18 +1592,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "has control" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] + }, + { + "@id": "https://w3id.org/dpv/risk#core-properties", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] } ] \ No newline at end of file diff --git a/2.1-dev/risk/modules/core.n3 b/2.1-dev/risk/modules/core.n3 index 1038e5c73..4d975563a 100644 --- a/2.1-dev/risk/modules/core.n3 +++ b/2.1-dev/risk/modules/core.n3 @@ -20,11 +20,13 @@ risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex:E0069, dex:E0070 ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "An actual or occured event"@en ; skos:inScheme risk:core-classes ; skos:prefLabel "Incident"@en ; @@ -86,9 +88,11 @@ risk:RiskMatrix a rdfs:Class, risk:RiskSource a rdfs:Class, skos:Concept ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:inScheme risk:core-classes ; skos:prefLabel "Risk Source"@en . diff --git a/2.1-dev/risk/modules/core.rdf b/2.1-dev/risk/modules/core.rdf index 18e96fa75..b52c62022 100644 --- a/2.1-dev/risk/modules/core.rdf +++ b/2.1-dev/risk/modules/core.rdf @@ -13,31 +13,53 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + + + + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + + 2024-02-14 + accepted + + + + - Vulnerability - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary 2024-02-14 accepted - + - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + 2024-02-14 accepted + + + + + + + Risk Concepts - RDF/XML serialiation + @@ -66,10 +88,10 @@ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - Julio Fernandez + Harshvardhan J. Pandit Rob Brennan Delaram Golpayegani - Harshvardhan J. Pandit + Julio Fernandez risk https://w3id.org/dpv/risk# @@ -85,30 +107,36 @@ - + + + + + - - Threat Source - Source of threat event, including both agent and non-agent sources - + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) + + 2024-02-14 accepted - + - - + - - Primer for Data Privacy Vocabulary + + + Risk Concepts - HTML serialiation - + - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + 2024-02-14 @@ -116,67 +144,23 @@ - - - - Threat - Risk source event which causes Risk - - - 2024-02-14 - accepted - - - - - - - - - - Risk Concepts - Turtle serialiation - - + - Incident - An actual or occured event - - Incident is realised or materialised risk + Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + + 2024-02-14 + 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - - - - - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 - accepted - - - - - - - - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 - accepted - - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html @@ -190,28 +174,6 @@ - - - - - Examples for Data Privacy Vocabulary - - - - - - - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - - 2024-02-14 - accepted - - - @@ -219,26 +181,20 @@ Risk Matrix Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - + 2024-02-14 accepted Harshvardhan J. Pandit - - - - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 - accepted - - + + + + + + + Risk Concepts - Turtle serialiation @@ -259,67 +215,63 @@ A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - Guides for Data Privacy Vocabulary - - - - + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) + has threat source + Indicates the threat (subject) has the indicated source (object) - - + + 2024-02-14 accepted - - - - - - - Risk Concepts - RDF/XML serialiation - - + - Risk Source - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - + Incident + An actual or occured event + + + Incident is realised or materialised risk 2024-02-14 + 2024-08-16 accepted + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - - - - - - - Risk Concepts - JSON-LD serialiation + + + + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + 2024-02-14 + accepted + + - + - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + 2024-02-14 @@ -327,6 +279,22 @@ + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + 2024-02-14 + accepted + + + @@ -339,61 +307,97 @@ - + - - + + + Examples for Data Privacy Vocabulary - Risk Concepts - HTML serialiation - + + + + + + + Risk Concepts - N3 serialiation + + + + + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 + accepted + + + + - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + 2024-02-14 accepted + - + - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary + Threat Source + Source of threat event, including both agent and non-agent sources + 2024-02-14 accepted - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html + + + + + Guides for Data Privacy Vocabulary + + - - + + + + Threat + Risk source event which causes Risk + + + 2024-02-14 + accepted + + - - + + + + + Primer for Data Privacy Vocabulary + + - + - - - - Risk Concepts - N3 serialiation + + + + Risk Concepts - JSON-LD serialiation + + + diff --git a/2.1-dev/risk/modules/core.ttl b/2.1-dev/risk/modules/core.ttl index 1038e5c73..4d975563a 100644 --- a/2.1-dev/risk/modules/core.ttl +++ b/2.1-dev/risk/modules/core.ttl @@ -20,11 +20,13 @@ risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex:E0069, dex:E0070 ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "An actual or occured event"@en ; skos:inScheme risk:core-classes ; skos:prefLabel "Incident"@en ; @@ -86,9 +88,11 @@ risk:RiskMatrix a rdfs:Class, risk:RiskSource a rdfs:Class, skos:Concept ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:inScheme risk:core-classes ; skos:prefLabel "Risk Source"@en . diff --git a/2.1-dev/risk/modules/incident-owl.jsonld b/2.1-dev/risk/modules/incident-owl.jsonld index 65f57a228..0abf0ffe7 100644 --- a/2.1-dev/risk/modules/incident-owl.jsonld +++ b/2.1-dev/risk/modules/incident-owl.jsonld @@ -1,52 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "An impact assessment associated with a incident" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Impact Assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -76,18 +30,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -105,7 +59,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -117,18 +71,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -146,7 +100,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -158,13 +112,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Environmental Incident" } ] }, @@ -210,7 +164,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -240,22 +194,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -269,7 +228,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -281,18 +240,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -310,7 +269,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -322,39 +281,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -364,50 +323,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/title": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Incident" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -425,7 +372,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -437,18 +384,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -466,7 +413,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -478,80 +425,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Environmental Incident" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@value": "Risk Concepts - N3 serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -561,7 +498,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -579,7 +516,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Notice" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -591,52 +528,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "@value": "http://www.w3.org/2004/02/skos/core" + }, { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "@id": "http://www.w3.org/2002/07/owl" + }, { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "http://www.w3.org/2000/01/rdf-schema" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -645,82 +567,175 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "accepted" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/hasVersion": [ { - "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "Incident Register" + "@value": "2022-08-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/license": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "2024-07-13" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -738,7 +753,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -750,84 +765,89 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TR/json-ld11/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Risk Concepts - JSON-LD serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -853,18 +873,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/guides", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -880,12 +900,12 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Guides for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/guides" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -895,7 +915,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -913,7 +964,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -925,214 +976,182 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/hasVersion": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Incident Suspected Report" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "accepted" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/" + "@language": "en", + "@value": "Identifier associated with an incident" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "Incident Identifier" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Risk Concepts" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "risk" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "A report describing the detection of a Incident" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Incident Detection Report" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -1150,7 +1169,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1162,49 +1181,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Risk Concepts - HTML serialiation" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -1234,49 +1265,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -1294,7 +1294,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1306,13 +1306,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Incident Handling Report" } ] } diff --git a/2.1-dev/risk/modules/incident-owl.rdf b/2.1-dev/risk/modules/incident-owl.rdf index 7b4659677..602a722bc 100644 --- a/2.1-dev/risk/modules/incident-owl.rdf +++ b/2.1-dev/risk/modules/incident-owl.rdf @@ -12,327 +12,327 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > + + + + Documented information about an incident, its handling, assessments,and notifications + + accepted + + 2024-05-19 + Incident Report + - - - + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + - - - - http://purl.org/ontology/bibo/status/published - - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - Harshvardhan J. Pandit + 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 + 10.5281/zenodo.12505841 - https://w3id.org/dpv/risk - 2.1-dev - risk http://www.w3.org/2004/02/skos/core http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + 2022-08-14 + http://purl.org/ontology/bibo/status/published + Harshvardhan J. Pandit Risk Concepts + RISK + + + risk - - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - Incident Concluding Report - + + + + + Notice associated with an Incident + Incident Notice + 2024-05-19 + accepted + + accepted + 2024-05-19 - 2024-05-19 + + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + - - - Primer for Data Privacy Vocabulary - - - - + + 2024-05-19 + + + + Confidentiality Incident + + Incident where the confidentiality of information or system has been affected + accepted - - + - Risk Concepts - RDF/XML serialiation + + Risk Concepts - RDF/XML serialiation - - Harshvardhan J. Pandit + + accepted + 2024-05-19 + - A register recording incidentes, their reports, notifications, and other related activities - - 2024-05-19 - Incident Register + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions - accepted - - - + accepted - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence 2024-05-19 - Incident Handling Report + + + + + Incident - - Incident caused due to deliberate actions of a human + + Incident Assessment Report + + + 2024-05-19 - + A report describing the assessment of an incident in terms of its effects or impacts accepted + + + + Incident caused due to accidental actions arising from human or human-controlled situations - Deliberate Incident + 2024-05-19 + Accidental Incident + + accepted - - Examples for Data Privacy Vocabulary - - - - - - - + + + Incident Identifier + accepted + 2024-05-19 + Identifier associated with an incident - Incident Ongoing Report + + + + accepted 2024-05-19 + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + Incident Concluding Report + + - accepted - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - - Risk Concepts - N3 serialiation - - - - - + Risk Concepts - Turtle serialiation - + - + + - Incident Assessment Report + Integrity Incident + Incident where the integrity of information or system has been affected accepted 2024-05-19 - A report describing the assessment of an incident in terms of its effects or impacts - - - - accepted + + + + + + Risk Concepts - JSON-LD serialiation + + + + - - 2024-05-19 - Documented information about an incident, its handling, assessments,and notifications - Incident Report - - - + Availability Incident accepted - Incident Identifier - - 2024-05-19 - Identifier associated with an incident + Incident where the availability of information or system has been affected - - Guides for Data Privacy Vocabulary - - + + + Risk Concepts - N3 serialiation + - - + + - + + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + Incident Preliminary Report + 2024-05-19 + + accepted - - - 2024-05-19 - Incident - - accepted - - - - - - Risk Concepts - JSON-LD serialiation - - - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + - - - Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again accepted - 2024-05-19 - - - accepted - - 2024-05-19 - - Incident where the integrity of information or system has been affected - Integrity Incident - - - Risk Concepts - HTML serialiation - - - - - + Incident Mitigation Measure + - 2024-05-19 Harshvardhan J. Pandit - Incident Impact Assessment - accepted An impact assessment associated with a incident - - - - - + accepted 2024-05-19 + Incident Impact Assessment - Incident where the confidentiality of information or system has been affected - accepted - - - Confidentiality Incident - + + A report describing the detection of a Incident + - 2024-05-19 - - Incident Preliminary Report + 2024-05-19 accepted - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + Incident Detection Report - + 2024-05-19 - Incident Detection Report - - A report describing the detection of a Incident + + Deliberate Incident accepted + Incident caused due to deliberate actions of a human - - A report describing the suspicion of an incident in the past or occuring - - accepted + + Incident Register + Harshvardhan J. Pandit + A register recording incidentes, their reports, notifications, and other related activities - Incident Suspected Report + accepted 2024-05-19 + - - - Incident caused due to accidental actions arising from human or human-controlled situations + + + + Examples for Data Privacy Vocabulary + + + + + + accepted - - 2024-05-19 - Accidental Incident - - - 2024-05-19 - Cross-Border Incident + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - accepted - - - Incident involving cross-border or multiple jurisdictions - - Availability Incident - + + Guides for Data Privacy Vocabulary + + + + + + + + A report describing the suspicion of an incident in the past or occuring accepted - - - 2024-05-19 - Incident where the availability of information or system has been affected - - - - - accepted - 2024-05-19 - Notice associated with an Incident - Incident Notice + + Incident Suspected Report + + + + + + + + + Primer for Data Privacy Vocabulary + + + + + Risk Concepts - HTML serialiation + + + 2024-05-19 + Incident caused due to environmental factors outside human controls - Environmental Incident - accepted + accepted diff --git a/2.1-dev/risk/modules/incident.csv b/2.1-dev/risk/modules/incident.csv index e5db950eb..24fca5d2e 100644 --- a/2.1-dev/risk/modules/incident.csv +++ b/2.1-dev/risk/modules/incident.csv @@ -1,22 +1,22 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Incident,class,https://w3id.org/dpv/risk#Incident,Incident,,,,,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentConcludingReport,class,https://w3id.org/dpv/risk#IncidentConcludingReport,Incident Concluding Report,A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentDetectionReport,class,https://w3id.org/dpv/risk#IncidentDetectionReport,Incident Detection Report,A report describing the detection of a Incident,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentHandlingReport,class,https://w3id.org/dpv/risk#IncidentHandlingReport,Incident Handling Report,A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentIdentifier,class,https://w3id.org/dpv/risk#IncidentIdentifier,Incident Identifier,Identifier associated with an incident,,,,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentImpactAssessment,class,https://w3id.org/dpv/risk#IncidentImpactAssessment,Incident Impact Assessment,An impact assessment associated with a incident,,https://w3id.org/dpv#ImpactAssessment,https://w3id.org/dpv#ImpactAssessment,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentMitigationMeasure,class,https://w3id.org/dpv/risk#IncidentMitigationMeasure,Incident Mitigation Measure,A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentNotice,class,https://w3id.org/dpv/risk#IncidentNotice,Incident Notice,Notice associated with an Incident,,https://w3id.org/dpv#Notice,https://w3id.org/dpv#Notice,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentOngoingReport,class,https://w3id.org/dpv/risk#IncidentOngoingReport,Incident Ongoing Report,A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentPreliminaryReport,class,https://w3id.org/dpv/risk#IncidentPreliminaryReport,Incident Preliminary Report,A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentRegister,class,https://w3id.org/dpv/risk#IncidentRegister,Incident Register,"A register recording incidentes, their reports, notifications, and other related activities",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentReport,class,https://w3id.org/dpv/risk#IncidentReport,Incident Report,"Documented information about an incident, its handling, assessments,and notifications",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport,Incident Suspected Report,A report describing the suspicion of an incident in the past or occuring,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +Incident,class,https://w3id.org/dpv/risk#Incident,Incident,,,,,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentConcludingReport,class,https://w3id.org/dpv/risk#IncidentConcludingReport,Incident Concluding Report,A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentDetectionReport,class,https://w3id.org/dpv/risk#IncidentDetectionReport,Incident Detection Report,A report describing the detection of a Incident,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentHandlingReport,class,https://w3id.org/dpv/risk#IncidentHandlingReport,Incident Handling Report,A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentIdentifier,class,https://w3id.org/dpv/risk#IncidentIdentifier,Incident Identifier,Identifier associated with an incident,,,,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentImpactAssessment,class,https://w3id.org/dpv/risk#IncidentImpactAssessment,Incident Impact Assessment,An impact assessment associated with a incident,,https://w3id.org/dpv#ImpactAssessment,https://w3id.org/dpv#ImpactAssessment,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentMitigationMeasure,class,https://w3id.org/dpv/risk#IncidentMitigationMeasure,Incident Mitigation Measure,A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentNotice,class,https://w3id.org/dpv/risk#IncidentNotice,Incident Notice,Notice associated with an Incident,,https://w3id.org/dpv#Notice,https://w3id.org/dpv#Notice,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentOngoingReport,class,https://w3id.org/dpv/risk#IncidentOngoingReport,Incident Ongoing Report,A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentPreliminaryReport,class,https://w3id.org/dpv/risk#IncidentPreliminaryReport,Incident Preliminary Report,A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentRegister,class,https://w3id.org/dpv/risk#IncidentRegister,Incident Register,"A register recording incidentes, their reports, notifications, and other related activities",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentReport,class,https://w3id.org/dpv/risk#IncidentReport,Incident Report,"Documented information about an incident, its handling, assessments,and notifications",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport,Incident Suspected Report,A report describing the suspicion of an incident in the past or occuring,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/incident.jsonld b/2.1-dev/risk/modules/incident.jsonld index 4e1156abf..b881142e6 100644 --- a/2.1-dev/risk/modules/incident.jsonld +++ b/2.1-dev/risk/modules/incident.jsonld @@ -1,161 +1,194 @@ [ { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "2022-08-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/license": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "2024-07-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Incident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "RISK" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "2.1-dev" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Incident" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -173,7 +206,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -184,13 +217,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -201,21 +234,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -229,7 +257,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -240,13 +268,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -257,12 +285,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -280,7 +308,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -291,13 +319,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -308,12 +336,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -331,7 +359,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -342,13 +370,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -359,156 +387,137 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Report" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Identifier associated with an incident" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@language": "en", + "@value": "Incident Identifier" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Incident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "@id": "https://w3id.org/dpv/examples#E0069" + }, { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/examples#E0070" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - N3 serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -526,7 +535,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -537,13 +546,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -554,12 +563,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -577,7 +586,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -588,13 +597,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -605,12 +614,49 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -645,7 +691,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -656,114 +702,105 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Incident Assessment Report" + "@id": "https://www.iana.org/assignments/media-types/text/html" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Incident Concluding Report" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -798,7 +835,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -809,200 +846,181 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://purl.org/dc/terms/format": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/title": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Julian Flake" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "2022-08-14" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/risk.jsonld" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "2024-07-13" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "Risk Concepts" + "@id": "https://w3id.org/dpv/risk#Incident" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "10.5281/zenodo.12505841" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk#Incident" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "risk" + "@language": "en", + "@value": "Incident where the availability of information or system has been affected" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Availability Incident" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1020,7 +1038,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1029,10 +1047,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1043,12 +1066,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1066,7 +1089,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1077,13 +1100,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1094,43 +1117,63 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#IntegrityIncident", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#Incident" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident where the integrity of information or system has been affected" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk#IncidentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1148,7 +1191,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1159,13 +1202,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1176,64 +1219,84 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -1243,7 +1306,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1278,7 +1341,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1289,12 +1352,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1329,7 +1392,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1340,22 +1403,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1369,7 +1431,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#Notice" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1380,13 +1442,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Notice" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1397,43 +1459,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1451,7 +1482,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1462,13 +1493,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1479,38 +1510,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Incident Assessment Report" } ] } diff --git a/2.1-dev/risk/modules/incident.rdf b/2.1-dev/risk/modules/incident.rdf index 53108e008..c66e041c9 100644 --- a/2.1-dev/risk/modules/incident.rdf +++ b/2.1-dev/risk/modules/incident.rdf @@ -12,11 +12,26 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 + accepted + + + + + + + + + + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts 2024-05-19 @@ -24,6 +39,50 @@ + + + + Confidentiality Incident + Incident where the confidentiality of information or system has been affected + + + 2024-05-19 + accepted + + + + + + + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + 2024-05-19 + accepted + + + + + + + Availability Incident + Incident where the availability of information or system has been affected + + + 2024-05-19 + accepted + + + + + + + + + + Risk Concepts - RDF/XML serialiation + @@ -80,36 +139,13 @@ - - - - Incident - - 2024-05-19 - accepted - - - - - - - + - - Primer for Data Privacy Vocabulary + + - - - - - Incident Identifier - Identifier associated with an incident - - 2024-05-19 - accepted - - + Risk Concepts - HTML serialiation @@ -124,56 +160,47 @@ - - - - - - - Risk Concepts - Turtle serialiation - - + - Environmental Incident - Incident caused due to environmental factors outside human controls - - + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + 2024-05-19 accepted - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + 2024-05-19 accepted - + - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated 2024-05-19 @@ -181,6 +208,26 @@ + + + + + + + Risk Concepts - Turtle serialiation + + + + + Incident Notice + Notice associated with an Incident + + + 2024-05-19 + accepted + + + @@ -193,23 +240,23 @@ - + - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - + Incident + 2024-05-19 accepted + + - + - Confidentiality Incident - Incident where the confidentiality of information or system has been affected + Integrity Incident + Incident where the integrity of information or system has been affected 2024-05-19 @@ -225,35 +272,42 @@ - + - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring - - + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + 2024-05-19 accepted - + - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - - + Incident Identifier + Identifier associated with an incident + 2024-05-19 accepted - + + + + + + + Risk Concepts - N3 serialiation + + - Integrity Incident - Incident where the integrity of information or system has been affected + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions 2024-05-19 @@ -261,37 +315,38 @@ - + - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - Availability Incident - Incident where the availability of information or system has been affected - - + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + 2024-05-19 accepted - + - Incident Notice - Notice associated with an Incident - - + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + 2024-05-19 accepted @@ -305,25 +360,13 @@ - + + - - - - - Risk Concepts - RDF/XML serialiation - - - - - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 - accepted - - + + Primer for Data Privacy Vocabulary + + @@ -333,47 +376,4 @@ Risk Concepts - JSON-LD serialiation - - - - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - - 2024-05-19 - accepted - - - - - - - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - - 2024-05-19 - accepted - - - - - - - - - - Risk Concepts - HTML serialiation - - - - - - - - Risk Concepts - N3 serialiation - - - - diff --git a/2.1-dev/risk/modules/incident_status-owl.jsonld b/2.1-dev/risk/modules/incident_status-owl.jsonld index d721bd1ad..4bab51e09 100644 --- a/2.1-dev/risk/modules/incident_status-owl.jsonld +++ b/2.1-dev/risk/modules/incident_status-owl.jsonld @@ -1,56 +1,72 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/guides", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@value": "Guides for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@id": "https://w3id.org/dpv/guides" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/format": [ { - "@value": "http://www.w3.org/2004/02/skos/core" - }, + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -59,178 +75,215 @@ ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Paul Ryan" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "Julian Flake" - }, + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "Incident Mitigated" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@language": "en", + "@value": "The status of a incident is unknown" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Incident Status Unknown" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk Concepts" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "risk" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "RISK" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@id": "https://w3id.org/dpv/risk/risk-owl.html" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/guides" - }, + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { "@id": "https://w3id.org/dpv/primer" - }, + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/owl" - }, + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "https://schema.org/version": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -263,52 +316,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -341,39 +363,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/turtle/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Risk Concepts - Turtle serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -383,9 +405,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -399,11 +422,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -411,7 +429,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -423,18 +441,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#IncidentStatus", @@ -470,49 +488,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "Risk Concepts - N3 serialiation" + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/owl#Status" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Status associated with an incident" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", "@type": [ "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -548,200 +586,240 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/description": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/hasVersion": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "https://w3id.org/dpv/risk" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "Risk Concepts - HTML serialiation" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", - "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "accepted" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "Incident Terminated" + "@value": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", - "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "RISK" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "2.1-dev" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Incident Ongoing" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, @@ -791,83 +869,5 @@ "@value": "Incident Concluded" } ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", - "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Mitigated" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] } ] \ No newline at end of file diff --git a/2.1-dev/risk/modules/incident_status-owl.rdf b/2.1-dev/risk/modules/incident_status-owl.rdf index f3ff147e3..38dbad661 100644 --- a/2.1-dev/risk/modules/incident_status-owl.rdf +++ b/2.1-dev/risk/modules/incident_status-owl.rdf @@ -12,222 +12,222 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - - accepted - - - - 2024-02-14 - Incident Concluded - Harshvardhan J. Pandit - + + + + + Guides for Data Privacy Vocabulary + + - - - + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + - - - - http://purl.org/ontology/bibo/status/published - - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - Harshvardhan J. Pandit + 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 + 10.5281/zenodo.12505841 - https://w3id.org/dpv/risk - 2.1-dev - risk http://www.w3.org/2004/02/skos/core http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + 2022-08-14 - Risk Concepts - - - 2024-02-14 - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + http://purl.org/ontology/bibo/status/published Harshvardhan J. Pandit - - - - Incident Suspected - accepted - - + Risk Concepts + + RISK + + risk - - + + - Primer for Data Privacy Vocabulary - - - + + + + Risk Concepts - RDF/XML serialiation - + + + Harshvardhan J. Pandit The status of a incident is unknown Incident Status Unknown accepted + 2024-02-14 + + + + The incident is ongoing i.e. still active + + + + accepted 2024-02-14 Harshvardhan J. Pandit + Incident Ongoing - + + accepted 2024-02-14 Harshvardhan J. Pandit Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - accepted + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - - - - - Risk Concepts - RDF/XML serialiation - - - - - - Examples for Data Privacy Vocabulary - - - - - - - Incident Status - Harshvardhan J. Pandit - + + - Status associated with an incident - 2024-02-14 - accepted - + Harshvardhan J. Pandit + accepted + 2024-02-14 + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + - + + Harshvardhan J. Pandit + accepted + Incident Suspected 2024-02-14 - Harshvardhan J. Pandit - Incident Ongoing - The incident is ongoing i.e. still active - accepted + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - - + + Incident Concluded + - The incident has halted or paused with a high likelihood of resuming or recurring - Incident Halted Harshvardhan J. Pandit + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring accepted 2024-02-14 - - - Risk Concepts - N3 serialiation - - - - - - - 2024-02-14 - + - Harshvardhan J. Pandit - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - Incident Mitigated + Incident Status + Status associated with an incident + accepted - + 2024-02-14 + Harshvardhan J. Pandit + + Incident Near Miss The state where an incident was almost successful in taking place i.e. "it came very close" - - accepted - + + + accepted 2024-02-14 Harshvardhan J. Pandit - Incident Near Miss - + Risk Concepts - Turtle serialiation - + - - Guides for Data Privacy Vocabulary - - + + Examples for Data Privacy Vocabulary + + + + + Incident Halted + Harshvardhan J. Pandit + + + + + accepted + 2024-02-14 + The incident has halted or paused with a high likelihood of resuming or recurring + - - + Risk Concepts - JSON-LD serialiation + + + + + + Risk Concepts - N3 serialiation + + + - Risk Concepts - HTML serialiation - + - + + Risk Concepts - HTML serialiation + + + + + + + + Primer for Data Privacy Vocabulary diff --git a/2.1-dev/risk/modules/incident_status.csv b/2.1-dev/risk/modules/incident_status.csv index 9d5c6bfd3..54b14ebdd 100644 --- a/2.1-dev/risk/modules/incident_status.csv +++ b/2.1-dev/risk/modules/incident_status.csv @@ -1,10 +1,10 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentHalted,class,https://w3id.org/dpv/risk#IncidentHalted,Incident Halted,The incident has halted or paused with a high likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentMitigated,class,https://w3id.org/dpv/risk#IncidentMitigated,Incident Mitigated,The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentNearMiss,class,https://w3id.org/dpv/risk#IncidentNearMiss,Incident Near Miss,"The state where an incident was almost successful in taking place i.e. ""it came very close""",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentOngoing,class,https://w3id.org/dpv/risk#IncidentOngoing,Incident Ongoing,The incident is ongoing i.e. still active,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentStatus,class,https://w3id.org/dpv/risk#IncidentStatus,Incident Status,Status associated with an incident,,https://w3id.org/dpv#Status,https://w3id.org/dpv#Status,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentStatusUnknown,class,https://w3id.org/dpv/risk#IncidentStatusUnknown,Incident Status Unknown,The status of a incident is unknown,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentSuspected,class,https://w3id.org/dpv/risk#IncidentSuspected,Incident Suspected,"The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentHalted,class,https://w3id.org/dpv/risk#IncidentHalted,Incident Halted,The incident has halted or paused with a high likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentMitigated,class,https://w3id.org/dpv/risk#IncidentMitigated,Incident Mitigated,The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentNearMiss,class,https://w3id.org/dpv/risk#IncidentNearMiss,Incident Near Miss,"The state where an incident was almost successful in taking place i.e. ""it came very close""",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentOngoing,class,https://w3id.org/dpv/risk#IncidentOngoing,Incident Ongoing,The incident is ongoing i.e. still active,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentStatus,class,https://w3id.org/dpv/risk#IncidentStatus,Incident Status,Status associated with an incident,,https://w3id.org/dpv#Status,https://w3id.org/dpv#Status,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentStatusUnknown,class,https://w3id.org/dpv/risk#IncidentStatusUnknown,Incident Status Unknown,The status of a incident is unknown,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentSuspected,class,https://w3id.org/dpv/risk#IncidentSuspected,Incident Suspected,"The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/incident_status.jsonld b/2.1-dev/risk/modules/incident_status.jsonld index 83efd6a4b..7b73eccda 100644 --- a/2.1-dev/risk/modules/incident_status.jsonld +++ b/2.1-dev/risk/modules/incident_status.jsonld @@ -1,12 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -42,7 +36,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -53,16 +47,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } ], "http://purl.org/dc/terms/contributor": [ { @@ -71,133 +77,196 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "accepted" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv#Status" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "accepted" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv#Status" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@language": "en", - "@value": "Incident Status" + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, @@ -254,85 +323,42 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -341,170 +367,139 @@ ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "accepted" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Incident Near Miss" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "@id": "https://w3id.org/dpv/risk/risk.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "https://schema.org/version": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -540,7 +535,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -551,12 +546,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -592,7 +587,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -603,12 +598,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentHalted", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -644,7 +670,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -655,74 +681,95 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TR/json-ld11/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Risk Concepts - JSON-LD serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/risk.jsonld" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The status of a incident is unknown" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -758,7 +805,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -769,33 +816,33 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -805,42 +852,16 @@ ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -853,11 +874,21 @@ "@value": "2024-02-14" } ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Status" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -866,13 +897,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -883,38 +914,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Incident Status" } ] } diff --git a/2.1-dev/risk/modules/incident_status.rdf b/2.1-dev/risk/modules/incident_status.rdf index b6ea467db..b57d22fc9 100644 --- a/2.1-dev/risk/modules/incident_status.rdf +++ b/2.1-dev/risk/modules/incident_status.rdf @@ -12,19 +12,13 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - Incident Status - Status associated with an incident - - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - + + + + + Guides for Data Privacy Vocabulary + + @@ -70,12 +64,12 @@ - + - Incident Ongoing - The incident is ongoing i.e. still active + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring 2024-02-14 accepted @@ -83,12 +77,12 @@ - + - Incident Status Unknown - The status of a incident is unknown + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring 2024-02-14 accepted @@ -96,12 +90,12 @@ - + - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + Incident Ongoing + The incident is ongoing i.e. still active 2024-02-14 accepted @@ -109,44 +103,12 @@ - - - - - Primer for Data Privacy Vocabulary - - - - - - - - - - Risk Concepts - Turtle serialiation - - - - - - Examples for Data Privacy Vocabulary - - - - - - - - - - Risk Concepts - N3 serialiation - - + - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring 2024-02-14 accepted @@ -162,12 +124,12 @@ Risk Concepts - RDF/XML serialiation - + - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring 2024-02-14 accepted @@ -175,12 +137,36 @@ - + + + + + + + Risk Concepts - JSON-LD serialiation + + + + + + + + Risk Concepts - N3 serialiation + + + + + + + + Risk Concepts - HTML serialiation + + - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing 2024-02-14 accepted @@ -188,12 +174,12 @@ - + - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + Incident Status Unknown + The status of a incident is unknown 2024-02-14 accepted @@ -201,12 +187,34 @@ - + + + + Incident Status + Status associated with an incident + + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Risk Concepts - Turtle serialiation + + - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" 2024-02-14 accepted @@ -214,29 +222,21 @@ - + - - Guides for Data Privacy Vocabulary + + Examples for Data Privacy Vocabulary - - - - - - - Risk Concepts - JSON-LD serialiation - - + + - - + + Primer for Data Privacy Vocabulary - Risk Concepts - HTML serialiation diff --git a/2.1-dev/risk/modules/risk_consequences-owl.jsonld b/2.1-dev/risk/modules/risk_consequences-owl.jsonld index 1918174ae..e261bb3b6 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.jsonld +++ b/2.1-dev/risk/modules/risk_consequences-owl.jsonld @@ -1,8 +1,8 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#CostInstallation", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17,9 +17,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f" + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -29,7 +35,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -41,37 +47,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Installation" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Installation" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f", + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -85,9 +91,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db" + "@id": "_:Nd8a232e440f041b496b97da8007b588a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -97,7 +109,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -109,18 +121,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db", + "@id": "_:Nd8a232e440f041b496b97da8007b588a", "@type": [ "https://schema.org/WebPage" ], @@ -136,10 +148,46 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Eavesdropping", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that arise during operational processes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Operational Security Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -153,9 +201,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118" + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -165,7 +219,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -177,18 +231,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Eavesdropping" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Eavesdropping" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118", + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", "@type": [ "https://schema.org/WebPage" ], @@ -204,10 +258,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -218,7 +272,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -228,7 +293,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -240,21 +305,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes non-material damages" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -268,9 +349,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955" + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -280,49 +367,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955", + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossControlOverData", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -333,7 +426,19 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -343,46 +448,35 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Control over Data" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Control over Data" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -390,7 +484,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -402,20 +496,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes material damages" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MisuseBreachedInformation", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -430,9 +524,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42" + "@id": "_:N2039355de6a7474a8ab35355297e33c6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -442,7 +542,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -454,53 +554,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Misuse of Breached Information" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse of Breached Information" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42", + "@id": "_:N2039355de6a7474a8ab35355297e33c6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostSuspendedOperations", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -510,7 +611,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -522,250 +623,100 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Suspended Operations" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Suspended Operations" - } - ] - }, - { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Prevent Exercising of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ - { - "@value": "Fajar Ekaputra" - }, { "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Julian Flake" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@language": "en", + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Unwanted Data Deletion" } + ] + }, + { + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CitizensImpact", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -780,9 +731,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68" + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -792,7 +749,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -804,36 +761,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Sabotage" } ] }, { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68", + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialEquipmentCosts", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -848,9 +805,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d" + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -860,7 +823,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -872,36 +835,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d", + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -916,9 +885,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c" + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -928,7 +903,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -940,18 +915,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c", + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", "@type": [ "https://schema.org/WebPage" ], @@ -967,28 +942,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalSpying", + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7757aee6b2134fec952a142a9d692e19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -996,7 +955,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1005,100 +964,41 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Physical Spying" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Spying" - } - ] - }, - { - "@id": "_:N7757aee6b2134fec952a142a9d692e19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossAssets", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Loss of Assets" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Loss of Assets" + "@value": "Examples for Data Privacy Vocabulary" } - ] - }, - { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/examples" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, @@ -1134,10 +1034,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalStalking", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1151,9 +1051,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec" + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1163,7 +1069,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1175,36 +1081,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Stalking" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Stalking" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec", + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonnelAbsence", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1219,9 +1125,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde" + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1231,7 +1143,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1243,48 +1155,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde", + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationOfRights", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1294,7 +1223,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1306,38 +1235,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:N834144a719d041d4970f5c070cc5f001" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1346,7 +1275,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1355,39 +1284,17 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Authorisation Failure" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:N834144a719d041d4970f5c070cc5f001", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#TheftMedia", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1402,9 +1309,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0" + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1414,7 +1327,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1426,18 +1339,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0", + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", "@type": [ "https://schema.org/WebPage" ], @@ -1453,9 +1372,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationTrustImpact", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1470,9 +1389,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642" + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1482,7 +1407,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1494,100 +1419,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Reputation and trust impact" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputation and trust impact" + "@value": "Injury" } ] }, { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642", + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Impact" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact(s) that acts as or causes benefits" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Benefit" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityExploited", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f" + "@id": "_:N3ef9f5a9eb554279905f69c263712205" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1597,7 +1481,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1609,37 +1493,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Blackmail" } ] }, { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f", + "@id": "_:N3ef9f5a9eb554279905f69c263712205", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1653,9 +1537,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1b96d48534be4188984fec841d97a254" + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1665,7 +1555,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1677,18 +1567,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:N1b96d48534be4188984fec841d97a254", + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", "@type": [ "https://schema.org/WebPage" ], @@ -1704,9 +1594,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1721,9 +1611,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7" + "@id": "_:N804ad242900c474395dd117c74dace8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1733,7 +1629,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1745,37 +1641,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7", + "@id": "_:N804ad242900c474395dd117c74dace8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BusinessPerformanceImpairment", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1789,9 +1685,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N42235d0a675a4bf393d379a4650a468b" + "@id": "_:N4387faf4bb854435bfdc47ebf666782a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1801,7 +1703,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1813,18 +1715,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Unauthorised System Access" } ] }, { - "@id": "_:N42235d0a675a4bf393d379a4650a468b", + "@id": "_:N4387faf4bb854435bfdc47ebf666782a", "@type": [ "https://schema.org/WebPage" ], @@ -1840,33 +1742,16 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceOnDataSecurity", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1876,39 +1761,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1916,7 +1785,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1928,48 +1797,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A type of social engineering attack involving deceptive messages intended to reveal sensitive information" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" - } - ] - }, - { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImpactOnDataSubject", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1979,7 +1838,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1991,21 +1850,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact on Data Subject" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact on Data Subject" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Stalking", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2019,9 +1884,23 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01" + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2031,7 +1910,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2043,18 +1922,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Stalking" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Stalking" + "@value": "Data Breach" } ] }, { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01", + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", "@type": [ "https://schema.org/WebPage" ], @@ -2070,9 +1949,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostOperationInterruption", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2087,9 +1966,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f" + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2099,7 +1984,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2111,18 +1996,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Public Order Breach" } ] }, { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f", + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", "@type": [ "https://schema.org/WebPage" ], @@ -2138,95 +2023,109 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossCompetitiveAdvantage", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Loss of Competitive Advantage" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Loss of Competitive Advantage" + "@value": "Risk Concepts - N3 serialiation" } - ] - }, - { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial penalties to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487" + "@language": "en", + "@value": "Judicial Penalty" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2235,7 +2134,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2247,37 +2146,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2291,9 +2211,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad" + "@id": "_:N12b2c9394da44250a5ab771adc23fab8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2303,7 +2229,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2315,18 +2241,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad", + "@id": "_:N12b2c9394da44250a5ab771adc23fab8", "@type": [ "https://schema.org/WebPage" ], @@ -2342,10 +2268,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Theft", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2359,9 +2285,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0987f80167844b359aae438673b4fe3b" + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2371,30 +2303,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N0987f80167844b359aae438673b4fe3b", + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", "@type": [ "https://schema.org/WebPage" ], @@ -2410,27 +2348,41 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossGoods", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N26efb77318794637980a0cf151019d5e" + "@language": "en", + "@value": "Privacy" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2439,7 +2391,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2447,41 +2399,49 @@ "@language": "en", "@value": "accepted" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Loss of Goods" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Loss of Goods" + "@value": "accepted" } - ] - }, - { - "@id": "_:N26efb77318794637980a0cf151019d5e", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2495,9 +2455,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd" + "@id": "_:N61513676426149faae9e58063eb667d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2507,7 +2473,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2519,55 +2485,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Coercion" } ] }, { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd", + "@id": "_:N61513676426149faae9e58063eb667d8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2575,7 +2525,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2587,37 +2537,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChildViolence", + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2628,12 +2562,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2643,7 +2578,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2655,53 +2590,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Child Violence" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Child Violence" - } - ] - }, - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harm" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DamageByThirdParty", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2711,7 +2637,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2723,49 +2649,75 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Damage by Third Party" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage by Third Party" + "@value": "Remuneration" } ] }, { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Detriment" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Detriment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2774,7 +2726,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2786,21 +2738,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2814,9 +2766,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62" + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2826,7 +2784,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2838,37 +2796,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "System Intrusion" } ] }, { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62", + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptionCommunications", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2882,9 +2840,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb9fe3106440c4546b4b449106947b906" + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2894,7 +2858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2906,18 +2870,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "Security Breach" } ] }, { - "@id": "_:Nb9fe3106440c4546b4b449106947b906", + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", "@type": [ "https://schema.org/WebPage" ], @@ -2933,41 +2897,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2981,17 +2914,15 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3001,7 +2932,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3013,53 +2944,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Malware Attack" } ] }, { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2", + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Nb24249010a4a495187a77d855cd41e79" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3069,7 +3001,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3081,37 +3013,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:Nb24249010a4a495187a77d855cd41e79", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossCredibility", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3125,9 +3041,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d" + "@id": "_:N73922ea12cd34584b91e209f306167ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3137,7 +3059,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3149,36 +3071,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d", + "@id": "_:N73922ea12cd34584b91e209f306167ae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossData", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3193,9 +3115,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc" + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3205,7 +3133,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3217,48 +3145,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Data" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Data" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc", + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7beef942706b41468112e467b91c5f39" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3268,7 +3207,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Benefit" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3280,20 +3219,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compensation provided (as an impact)" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Malicious Code Attack" + } + ] + }, + { + "@id": "_:N7beef942706b41468112e467b91c5f39", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedImpersonation", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3308,9 +3263,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4" + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3320,7 +3281,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3332,18 +3293,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "Fraud" } ] }, { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4", + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", "@type": [ "https://schema.org/WebPage" ], @@ -3359,9 +3320,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3376,9 +3337,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N625ea761ef2c46e49325339e76de3953" + "@id": "_:Neb960f38438d48258bee0ebae96be48e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3388,7 +3355,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3400,37 +3367,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N625ea761ef2c46e49325339e76de3953", + "@id": "_:Neb960f38438d48258bee0ebae96be48e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationEthicalCode", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3444,9 +3411,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c" + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3456,7 +3429,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3468,18 +3441,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Ethical Code" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Ethical Code" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c", + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", "@type": [ "https://schema.org/WebPage" ], @@ -3495,10 +3468,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PrivacyImpact", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3512,9 +3485,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101" + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3524,7 +3503,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3536,37 +3515,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Privacy impact" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy impact" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101", + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityDispute", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3577,7 +3556,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-24" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N498890541a5449e290f0aea406ea5090" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3587,7 +3577,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3599,20 +3589,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "_:N498890541a5449e290f0aea406ea5090", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3627,9 +3633,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3" + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3639,7 +3651,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3651,48 +3663,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Extorsion" } ] }, { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3", + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3702,7 +3725,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3714,68 +3737,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Renumeration provided as compensation (as an impact)" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", "@type": [ - "https://w3id.org/dpv/owl#Impact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Payment provided as compensation (as an impact)" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Payment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Businessdisruption", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3789,9 +3781,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na71895376af947a9838430e3e01d3915" + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3801,7 +3799,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3813,37 +3811,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business disruption" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business disruption" + "@value": "Human Errors" } ] }, { - "@id": "_:Na71895376af947a9838430e3e01d3915", + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HealthLifeImpact", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3857,9 +3855,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5" + "@id": "_:N83bd5296b4d94804a73f0e0518c39495" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3869,7 +3873,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3881,67 +3885,78 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Health and life impact" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Health and life impact" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5", + "@id": "_:N83bd5296b4d94804a73f0e0518c39495", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3956,9 +3971,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c" + "@id": "_:N903ec696d7504183af4ba63f3f295e8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3968,7 +3989,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3980,18 +4001,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Psychological Harm" } ] }, { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c", + "@id": "_:N903ec696d7504183af4ba63f3f295e8e", "@type": [ "https://schema.org/WebPage" ], @@ -4007,10 +4028,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4024,9 +4045,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N849c56349f884574b5accd799cf4b01d" + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4036,7 +4063,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4048,53 +4075,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Customer Confidence" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Customer Confidence" + "@value": "Compromise Account" } ] }, { - "@id": "_:N849c56349f884574b5accd799cf4b01d", + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GovernmentCrisis", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4104,7 +4132,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4116,34 +4144,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Government Crisis" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Government Crisis" - } - ] - }, - { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -4159,25 +4171,25 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - HTML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4191,9 +4203,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5" + "@id": "_:Nf877665a169e4a7eac29964fc15db245" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4203,7 +4221,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4215,36 +4233,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Goodwill" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Goodwill" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5", + "@id": "_:Nf877665a169e4a7eac29964fc15db245", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InternalOperationDisruption", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4256,12 +4274,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4271,7 +4290,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4283,55 +4302,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Internal Operation Disruption" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Operation Disruption" - } - ] - }, - { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostJudicialProceedings", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4339,7 +4326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4351,189 +4338,252 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Judicial Proceedings" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Judicial Proceedings" + "@value": "Societal Risk" } ] }, { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ + { + "@value": "Axel Polleres" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Georg P. Krog" + }, { "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, { - "@id": "_:Na7ae462a47ff4a078544c1576af327df" + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ { - "@language": "en", - "@value": "Equipment Malfunction" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "2024-07-13" } - ] - }, - { - "@id": "_:Na7ae462a47ff4a078544c1576af327df", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/source": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/title": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/ontology/bibo/doi": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "10.5281/zenodo.12505841" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "risk" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "accepted" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@language": "en", - "@value": "Intentional use of software by including or inserting in a system for a harmful purpose" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@language": "en", - "@value": "Malicious Code Attack" + "@value": "2.1-dev" } - ] - }, - { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoteSpying", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N76f8e9999d454353951813283e46b250" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4543,7 +4593,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4555,37 +4605,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Remote Spying" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remote Spying" + "@value": "Compensation" } ] }, { - "@id": "_:N76f8e9999d454353951813283e46b250", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossTechnologicalAdvantage", + "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4599,9 +4664,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac" + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4611,7 +4682,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4623,18 +4694,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Technological Advantage" + "@value": "Something that acts as or causes Vulnerability Created" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Technological Advantage" + "@value": "Vulnerability Created" } ] }, { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac", + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", "@type": [ "https://schema.org/WebPage" ], @@ -4650,28 +4721,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossCustomers", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4679,7 +4734,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4691,37 +4746,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Customers" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Customers" - } - ] - }, - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Component Failure" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4732,3822 +4777,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes harms" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Harm" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ] - }, - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes detriments" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Detriment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CyberSpying", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cyber Spying" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cyber Spying" - } - ] - }, - { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceForDataSubject", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Consequence for Data Subject" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Consequence for Data Subject" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Damage", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes damages" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Damage" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountSecurity", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compromise Account Security" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Compromise Account Security" - } - ] - }, - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ImpactToRights", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Impact to Rights" - } - ] - }, - { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#FinancialInvestigationCosts", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Financial Investigation Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Investigation Costs" - } - ] - }, - { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N314876c286064f38bbd79769edaa4106" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Code Modification" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N314876c286064f38bbd79769edaa4106", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Coercion" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnknownVulnerabilityExploited", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unknown Vulnerability Exploited" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unknown Vulnerability Exploited" - } - ] - }, - { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MisinformationDisinformation", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Misinformation and Disinformation" - } - ] - }, - { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LawEnforcementAdverseEffects", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Law Enforcement Adverse Effects" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Law Enforcement Adverse Effects" - } - ] - }, - { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Intrusion" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N471809172d6943bf838438296ceb4144" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Brute Force Authorisations" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:N471809172d6943bf838438296ceb4144", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Equipment Failure" - } - ] - }, - { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#FinancialPersonnelCosts", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Financial Personnel Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Personnel Costs" - } - ] - }, - { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Scam", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Scam" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2adacc609baf48e9b49883302a41f00c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Code Access" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:N2adacc609baf48e9b49883302a41f00c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#HarmfulSpeech", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Harmful Speech" - } - ] - }, - { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalSafetyEndangerment", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Environmental Safety Endangerment" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Environmental Safety Endangerment" - } - ] - }, - { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossReputation", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na656b20429c445f88a1845779a6748c4" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Reputation" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Reputation" - } - ] - }, - { - "@id": "_:Na656b20429c445f88a1845779a6748c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ServiceInterruption", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Service Interruption" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Service Interruption" - } - ] - }, - { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossOpportunity", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Opportunity" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Opportunity" - } - ] - }, - { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AbusiveContentUtilisation", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Abusive Content Utilisation" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Abusive Content Utilisation" - } - ] - }, - { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CyberStalking", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cyber Stalking" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cyber Stalking" - } - ] - }, - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Delaram Golpayegani" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Misuse" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Misuse" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RansomwareAttack", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3" - }, - { - "@id": "_:N5e35e90757324413800afec9a109dbc4" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Ransomware Attack" - } - ] - }, - { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "_:N5e35e90757324413800afec9a109dbc4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CostConfiguration", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Configuration" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Configuration" - } - ] - }, - { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Psychological Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Personal Safety Endangerment" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CostJudicialPenalties", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Judicial Penalties" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Judicial Penalties" - } - ] - }, - { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RetrievalDeletedData", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Retrieval of Deleted Data" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Retrieval of Deleted Data" - } - ] - }, - { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ReplacementCosts", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4c9741bd041f4390a8836eff65dee208" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Replacement Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Replacement Costs" - } - ] - }, - { - "@id": "_:N4c9741bd041f4390a8836eff65dee208", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolationRegulatoryObligations", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ] - }, - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossSuppliers", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Suppliers" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Suppliers" - } - ] - }, - { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N30752965a65a41159a1711755717d53a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N30752965a65a41159a1711755717d53a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LimitationOfRights", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Limitation of Rights" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossNegotiatingCapacity", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Negotiating Capacity" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Negotiating Capacity" - } - ] - }, - { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Failure" - } - ] - }, - { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Physical Assault" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Re-Identification" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Re-Identification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Confidentiality Breach" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Human Errors" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ComplianceImpact", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compliance impact" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Compliance impact" - } - ] - }, - { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IllegalProcessingData", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Illegal Processing of Data" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Illegal Processing of Data" - } - ] - }, - { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OrganisationDisruption", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Organisation Disruption" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Organisation Disruption" - } - ] - }, - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N796489c956df43e6941a9ff63835f450" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:N796489c956df43e6941a9ff63835f450", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Sabotage" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolationCodeConduct", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Code of Conduct" - } - ] - }, - { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossProprietaryInformation", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N991585ef26bb47108970a62346663fd8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Proprietary Information" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Proprietary Information" - } - ] - }, - { - "@id": "_:N991585ef26bb47108970a62346663fd8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RetrievalDiscardedEquipment", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ] - }, - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Erroneous System Use" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DangertoCustomers", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N18831f0e8999465a8606d764cedbf772" + "@id": "_:Nad476399871e41a5bd37e1133df27770" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8557,7 +4798,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8569,48 +4810,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Customers" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Customers" + "@value": "Identity Theft" } ] }, { - "@id": "_:N18831f0e8999465a8606d764cedbf772", + "@id": "_:Nad476399871e41a5bd37e1133df27770", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EconomicDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8620,7 +4872,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8632,21 +4884,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8660,9 +4928,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc" + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8672,30 +4946,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc", + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", "@type": [ "https://schema.org/WebPage" ], @@ -8711,10 +4991,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8728,9 +5008,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc" + "@id": "_:Nbb93cef662444084828d04948d35895d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8740,7 +5026,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8752,18 +5038,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Lose of Trust" } ] }, { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc", + "@id": "_:Nbb93cef662444084828d04948d35895d", "@type": [ "https://schema.org/WebPage" ], @@ -8779,10 +5065,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8796,9 +5082,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477" + "@id": "_:N9ba04625c759479eba79e0016163e8e6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8808,30 +5100,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477", + "@id": "_:N9ba04625c759479eba79e0016163e8e6", "@type": [ "https://schema.org/WebPage" ], @@ -8847,9 +5145,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetrimentToRecovery", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8864,9 +5162,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne6d29cc562794702b681b9554016eecb" + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8876,54 +5180,60 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Detriment to Recovery" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment to Recovery" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:Ne6d29cc562794702b681b9554016eecb", + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ @@ -8932,6 +5242,12 @@ "@value": "2022-08-19" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8939,7 +5255,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8951,20 +5267,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossResources", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8979,9 +5295,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6f190351ee794fc7bea72163952a80c9" + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8991,49 +5313,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Resources" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Resources" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N6f190351ee794fc7bea72163952a80c9", + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vandalism", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9047,9 +5375,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N876c898e81374a399d04313b0a0abd5c" + "@id": "_:N0d138f94265e46f293490fbe0fc8074c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9059,7 +5393,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9071,36 +5405,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vandalism" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vandalism" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:N876c898e81374a399d04313b0a0abd5c", + "@id": "_:N0d138f94265e46f293490fbe0fc8074c", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BusinessImpact", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -9115,9 +5449,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9088c785a56f4f7fa048660465c7540e" + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9127,7 +5467,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/owl#Impact" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9139,37 +5482,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business impact" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business impact" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:N9088c785a56f4f7fa048660465c7540e", + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossTrust", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9183,9 +5532,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N581201da4fd547aea094261f8d92243c" + "@id": "_:N8193907d23bd43dc8b146573989b8a0d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9195,7 +5550,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9207,37 +5562,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Trust" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Trust" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:N581201da4fd547aea094261f8d92243c", + "@id": "_:N8193907d23bd43dc8b146573989b8a0d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9251,9 +5606,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N787d49d55a21419a871a50a966b25089" + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9263,7 +5624,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9275,37 +5636,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Injury" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:N787d49d55a21419a871a50a966b25089", + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#TheftEquipment", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9319,9 +5686,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee206c8da189455dba93fd20501581cb" + "@id": "_:N7f1dc230141c4448a99f28f362191020" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9331,7 +5704,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9343,18 +5716,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:Nee206c8da189455dba93fd20501581cb", + "@id": "_:N7f1dc230141c4448a99f28f362191020", "@type": [ "https://schema.org/WebPage" ], @@ -9370,9 +5749,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossFunds", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -9387,9 +5766,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N853be36f6ea645d181836e5c35b74b46" + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9399,7 +5784,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9411,37 +5796,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Funds" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Funds" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "_:N853be36f6ea645d181836e5c35b74b46", + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9455,9 +5840,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5" + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9467,7 +5858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9479,18 +5870,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5", + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", "@type": [ "https://schema.org/WebPage" ], @@ -9506,26 +5897,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostBackup", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9535,7 +5927,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9547,53 +5939,62 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Backup" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Backup" + "@value": "Reward" } ] }, { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#KnownVulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N929457e20b914d3ca2b32435a60cb142" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9603,7 +6004,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9615,36 +6016,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" - } - ] - }, - { - "@id": "_:N929457e20b914d3ca2b32435a60cb142", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -9659,9 +6044,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe" + "@id": "_:Nbeddee22b7a841e39879764ab63949f8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9671,7 +6062,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9683,37 +6074,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe", + "@id": "_:Nbeddee22b7a841e39879764ab63949f8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndustrialCrisis", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9727,9 +6118,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na943aaebcd6b4587862424ae0d880839" + "@id": "_:N0282f3114f5b4278b632620b9b954c7d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9739,7 +6136,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9751,18 +6148,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:Na943aaebcd6b4587862424ae0d880839", + "@id": "_:N0282f3114f5b4278b632620b9b954c7d", "@type": [ "https://schema.org/WebPage" ], @@ -9778,23 +6175,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ - "https://w3id.org/dpv/owl#Impact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9802,7 +6188,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9814,21 +6200,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Reward provided as compensation (as an impact)" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialRepairCosts", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9842,9 +6228,18 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a" + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" + }, + { + "@id": "_:N698cebdfba864777b23d25052c4d2493" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9854,7 +6249,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9866,18 +6264,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Repair Costs" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Repair Costs" + "@value": "Spoofing" } ] }, { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a", + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", "@type": [ "https://schema.org/WebPage" ], @@ -9893,10 +6291,26 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9907,12 +6321,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N4b03b00cf447447bb996b08636f08431" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9922,7 +6337,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9934,37 +6349,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:N4b03b00cf447447bb996b08636f08431", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9978,9 +6383,18 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff" + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" + }, + { + "@id": "_:N51a29309d655420e8611a50e7d2baa7c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9990,7 +6404,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10002,49 +6416,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff", + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "_:N51a29309d655420e8611a50e7d2baa7c", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10053,7 +6472,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10065,20 +6484,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spying", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10093,9 +6512,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993" + "@id": "_:N347037135ba54cefae0a2a69a47e52d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10105,7 +6530,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10117,18 +6542,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spying" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spying" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993", + "@id": "_:N347037135ba54cefae0a2a69a47e52d9", "@type": [ "https://schema.org/WebPage" ], @@ -10144,9 +6569,40 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncreaseInternalCost", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10161,9 +6617,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3" + "@id": "_:N0296c48d481641d492572a05652b6bf5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10173,7 +6635,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10185,18 +6647,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Financial Loss" } ] }, { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3", + "@id": "_:N0296c48d481641d492572a05652b6bf5", "@type": [ "https://schema.org/WebPage" ], @@ -10212,9 +6674,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10226,12 +6688,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10241,7 +6704,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10253,36 +6716,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fraud" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" - } - ] - }, - { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10297,9 +6750,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35" + "@id": "_:N540e39aa17014568ba5a2b03534c1f19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10309,7 +6768,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10321,50 +6780,128 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35", + "@id": "_:N540e39aa17014568ba5a2b03534c1f19", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PreventExercisingOfRights", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10372,7 +6909,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10384,21 +6921,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spam", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10412,9 +6949,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74" + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10424,7 +6967,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10436,36 +6979,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spam" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spam" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74", + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationContractualObligations", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10480,9 +7023,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N615266688f80421fb6568a1b19a929d0" + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10492,7 +7041,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10504,37 +7053,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Contractual Obligations" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligations" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N615266688f80421fb6568a1b19a929d0", + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10548,9 +7103,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2" + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10560,7 +7121,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10572,18 +7133,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Terrorism" } ] }, { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2", + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", "@type": [ "https://schema.org/WebPage" ], @@ -10599,10 +7160,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostAcquisition", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10616,9 +7177,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354" + "@id": "_:Na66b6d002d3f448981a58870da1a686e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10628,7 +7195,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10640,18 +7207,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Acquisition" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Acquisition" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354", + "@id": "_:Na66b6d002d3f448981a58870da1a686e", "@type": [ "https://schema.org/WebPage" ], @@ -10667,26 +7234,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AttackonPrivateLife", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N080033b8d0c44467ad532c1c7579376c" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10696,7 +7264,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10708,86 +7276,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Attack on Private Life" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Attack on Private Life" - } - ] - }, - { - "@id": "_:N080033b8d0c44467ad532c1c7579376c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@language": "en", + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10795,7 +7342,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10807,36 +7354,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" - } - ] - }, - { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10851,9 +7382,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce" + "@id": "_:N1802c2900f5b4c578896c91c3149381d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10863,30 +7400,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce", + "@id": "_:N1802c2900f5b4c578896c91c3149381d", "@type": [ "https://schema.org/WebPage" ], @@ -10902,26 +7445,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10931,7 +7475,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10943,37 +7487,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DangertoPersonnel", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10987,9 +7515,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6175971113014283a5d3202f299a2a09" + "@id": "_:N842f6dd3b92c482180f56ce6a495c382" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10999,7 +7533,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11011,18 +7545,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Personnel" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Personnel" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N6175971113014283a5d3202f299a2a09", + "@id": "_:N842f6dd3b92c482180f56ce6a495c382", "@type": [ "https://schema.org/WebPage" ], @@ -11038,10 +7572,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ThirdPartyOperationDisruption", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11055,9 +7589,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N213543eccf8b457d9b7afa4825722eef" + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11067,7 +7607,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11079,55 +7619,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Third Party Operation Disruption" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Third Party Operation Disruption" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:N213543eccf8b457d9b7afa4825722eef", + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CorruptionData", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11135,7 +7659,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11144,57 +7668,35 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Corruption of Data" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Corruption of Data" - } - ] - }, - { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "DGA 2.10" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11204,7 +7706,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11216,44 +7718,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fee provided as compensation (as an impact)" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "Concepts associated with security threats and issues that originate within the organisation" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Internal Security Threat" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences-owl.n3 b/2.1-dev/risk/modules/risk_consequences-owl.n3 index e8677041a..100050053 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.n3 +++ b/2.1-dev/risk/modules/risk_consequences-owl.n3 @@ -15,2261 +15,1549 @@ @prefix vann: . @prefix xsd: . -risk-owl:AbusiveContentUtilisation a rdfs:Class, +risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Abusive Content Utilisation"@en ; - skos:prefLabel "Abusive Content Utilisation"@en . - -risk-owl:AttackonPrivateLife a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Attack on Private Life"@en ; - skos:prefLabel "Attack on Private Life"@en . + skos:definition "Accidental Misuse"@en ; + skos:prefLabel "Accidental Misuse"@en . risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Authorisation Failure"@en ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . +risk-owl:AvailabilityBreach a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Blackmail"@en ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Brute Force Authorisations"@en ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . -risk-owl:BusinessImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Business impact"@en ; - skos:prefLabel "Business impact"@en . - -risk-owl:BusinessPerformanceImpairment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business Performance Impairment"@en ; - skos:prefLabel "Business Performance Impairment"@en . - -risk-owl:Businessdisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business disruption"@en ; - skos:prefLabel "Business disruption"@en . - -risk-owl:ChildViolence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Child Violence"@en ; - skos:prefLabel "Child Violence"@en . - -risk-owl:CitizensImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Citizens impact"@en ; - skos:prefLabel "Citizens impact"@en . - risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Coercion"@en ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Benefit ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . -risk-owl:ComplianceImpact a rdfs:Class, +risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compliance impact"@en ; - skos:prefLabel "Compliance impact"@en . + skos:definition "Something that acts as or causes Component Failure"@en ; + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccount a rdfs:Class, +risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account"@en ; - skos:prefLabel "Compromise Account"@en . + skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccountCredentials a rdfs:Class, +risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Credentials"@en ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:prefLabel "Compromise Account"@en . -risk-owl:CompromiseAccountSecurity a rdfs:Class, +risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Security"@en ; - skos:prefLabel "Compromise Account Security"@en . + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Confidentiality Breach"@en ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . -risk-owl:ConsequenceForDataSubject a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence for Data Subject"@en ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk-owl:ConsequenceOnDataSecurity a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence on Data Security"@en ; - skos:prefLabel "Consequence on Data Security"@en . - risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Copyright Violation"@en ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . -risk-owl:CorruptionData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Corruption of Data"@en ; - skos:prefLabel "Corruption of Data"@en . - -risk-owl:CostAcquisition a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Acquisition"@en ; - skos:prefLabel "Cost of Acquisition"@en . - -risk-owl:CostBackup a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Backup"@en ; - skos:prefLabel "Cost of Backup"@en . - -risk-owl:CostConfiguration a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Configuration"@en ; - skos:prefLabel "Cost of Configuration"@en . - -risk-owl:CostInstallation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Installation"@en ; - skos:prefLabel "Cost of Installation"@en . - -risk-owl:CostJudicialPenalties a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk-owl:CostJudicialProceedings a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk-owl:CostOperationInterruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Operation Interruption"@en ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk-owl:CostSuspendedOperations a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Suspended Operations"@en ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . -risk-owl:CyberSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Spying"@en ; - skos:prefLabel "Cyber Spying"@en . - -risk-owl:CyberStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Stalking"@en ; - skos:prefLabel "Cyber Stalking"@en . - risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . -risk-owl:DamageByThirdParty a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Damage by Third Party"@en ; - skos:prefLabel "Damage by Third Party"@en . - -risk-owl:DangertoCustomers a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Danger to Customers"@en ; - skos:prefLabel "Danger to Customers"@en . - -risk-owl:DangertoPersonnel a rdfs:Class, +risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex-owl:E0069, + dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Danger to Personnel"@en ; - skos:prefLabel "Danger to Personnel"@en . + skos:definition "Something that acts as or causes Data Breach"@en ; + skos:prefLabel "Data Breach"@en . -risk-owl:DataBreach a rdfs:Class, +risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex-owl:E0069, - dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Data Breach"@en ; - skos:prefLabel "Data Breach"@en . + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . -risk-owl:DetrimentToRecovery a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Detriment to Recovery"@en ; - skos:prefLabel "Detriment to Recovery"@en . - risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Discrimination"@en ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk-owl:Eavesdropping a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Eavesdropping"@en ; - skos:prefLabel "Eavesdropping"@en . - -risk-owl:EconomicDisadvantage a rdfs:Class, +risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Economic Disadvantage"@en ; - skos:prefLabel "Economic Disadvantage"@en . + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; + skos:prefLabel "Environmental Risk"@en . -risk-owl:EnvironmentalSafetyEndangerment a rdfs:Class, +risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Environmental Safety Endangerment"@en ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:EquipmentFailure a rdfs:Class, +risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Equipment Failure"@en ; - skos:prefLabel "Equipment Failure"@en . + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:EquipmentMalfunction a rdfs:Class, +risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Equipment Malfunction"@en ; - skos:prefLabel "Equipment Malfunction"@en . + skos:definition "Something that acts as or causes Erroneous System Use"@en ; + skos:prefLabel "Erroneous System Use"@en . -risk-owl:ErroneousSystemUse a rdfs:Class, +risk-owl:ExposureToHarmfulSpeech a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Erroneous System Use"@en ; - skos:prefLabel "Erroneous System Use"@en . + skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk-owl:ExternalSecurityThreat a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:prefLabel "External Security Threat"@en . risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Extorsion"@en ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:Fee a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; - sw:term_status "accepted"@en ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + rdfs:subClassOf risk-owl:FinancialImpact ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:prefLabel "Fee"@en . -risk-owl:FinancialEquipmentCosts a rdfs:Class, +risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Financial Equipment Costs"@en ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk-owl:FinancialInvestigationCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Investigation Costs"@en ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:definition "Things that cause or have the potential to impact financial resources"@en ; + skos:prefLabel "Financial Impact"@en . risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Financial Loss"@en ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . -risk-owl:FinancialPersonnelCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Personnel Costs"@en ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk-owl:FinancialRepairCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Repair Costs"@en ; - skos:prefLabel "Financial Repair Costs"@en . - risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Fraud"@en ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . -risk-owl:GovernmentCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Government Crisis"@en ; - skos:prefLabel "Government Crisis"@en . - risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes harms"@en ; - skos:prefLabel "Harm"@en . - -risk-owl:HarmfulSpeech a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Harmful Speech"@en ; - skos:prefLabel "Harmful Speech"@en . - -risk-owl:HealthLifeImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Health and life impact"@en ; - skos:prefLabel "Health and life impact"@en . + skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Human Errors"@en ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:prefLabel "Human Errors"@en . -risk-owl:IdentityDispute a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Identity Dispute"@en ; - skos:prefLabel "Identity Dispute"@en . - risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Fraud"@en ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Theft"@en ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . -risk-owl:IllegalProcessingData a rdfs:Class, +risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Illegal Processing of Data"@en ; - skos:prefLabel "Illegal Processing of Data"@en . + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . -risk-owl:ImpactOnDataSubject a rdfs:Class, +risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact on Data Subject"@en ; - skos:prefLabel "Impact on Data Subject"@en . - -risk-owl:ImpactToRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en . - -risk-owl:IncreaseInternalCost a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Increase Internal Cost"@en ; - skos:prefLabel "Increase Internal Cost"@en . - -risk-owl:IndustrialCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Industrial Crisis"@en ; - skos:prefLabel "Industrial Crisis"@en . - -risk-owl:Injury a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Injury"@en ; - skos:prefLabel "Injury"@en . - -risk-owl:InterceptionCommunications a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Interception of Communications"@en ; - skos:prefLabel "Interception of Communications"@en . - -risk-owl:InternalOperationDisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Internal Operation Disruption"@en ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk-owl:KnownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk-owl:LawEnforcementAdverseEffects a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . - -risk-owl:LimitationOfRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Limitation of Rights"@en ; - skos:prefLabel "Limitation of Rights"@en . - -risk-owl:LossAssets a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Assets"@en ; - skos:prefLabel "Loss of Assets"@en . - -risk-owl:LossCompetitiveAdvantage a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:prefLabel "Loss of Competitive Advantage"@en . - -risk-owl:LossControlOverData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Control over Data"@en ; - skos:prefLabel "Loss of Control over Data"@en . - -risk-owl:LossCredibility a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Credibility"@en ; - skos:prefLabel "Loss of Credibility"@en . - -risk-owl:LossCustomerConfidence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + rdfs:subClassOf risk-owl:IndividualRisk ; + sw:term_status "accepted"@en ; + skos:prefLabel "Individual Health & Safety"@en . + +risk-owl:IndividualRisk a rdfs:Class, + owl:Class ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; sw:term_status "accepted"@en ; - skos:definition "Loss of Customer Confidence"@en ; - skos:prefLabel "Loss of Customer Confidence"@en . + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; + skos:prefLabel "Individual Risk"@en . -risk-owl:LossCustomers a rdfs:Class, +risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Customers"@en ; - skos:prefLabel "Loss of Customers"@en . + skos:definition "Something that acts as or causes Injury"@en ; + skos:prefLabel "Injury"@en . -risk-owl:LossData a rdfs:Class, +risk-owl:IntegrityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + +risk-owl:IntentionalMisuse a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Loss of Data"@en ; - skos:prefLabel "Loss of Data"@en . + skos:definition "Intentional Misuse"@en ; + skos:prefLabel "Intentional Misuse"@en . -risk-owl:LossFunds a rdfs:Class, +risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . + +risk-owl:InternalSecurityThreat a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Funds"@en ; - skos:prefLabel "Loss of Funds"@en . + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; + skos:prefLabel "Internal Security Threat"@en . -risk-owl:LossGoods a rdfs:Class, +risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Loss of Goods"@en ; - skos:prefLabel "Loss of Goods"@en . + skos:definition "Something that involves or causes judicial costs to be paid"@en ; + skos:prefLabel "Judicial Costs"@en . -risk-owl:LossGoodwill a rdfs:Class, +risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Loss of Goodwill"@en ; - skos:prefLabel "Loss of Goodwill"@en . + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; + skos:prefLabel "Judicial Penalty"@en . -risk-owl:LossNegotiatingCapacity a rdfs:Class, +risk-owl:LegalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Negotiating Capacity"@en ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:prefLabel "Legal Risk"@en . -risk-owl:LossOpportunity a rdfs:Class, +risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Opportunity"@en ; - skos:prefLabel "Loss of Opportunity"@en . + skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:prefLabel "Lose of Credibility"@en . -risk-owl:LossProprietaryInformation a rdfs:Class, +risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Proprietary Information"@en ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:prefLabel "Lose of Customer Confidence"@en . -risk-owl:LossReputation a rdfs:Class, +risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Reputation"@en ; - skos:prefLabel "Loss of Reputation"@en . + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:prefLabel "Lose of Goodwill"@en . -risk-owl:LossResources a rdfs:Class, +risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Resources"@en ; - skos:prefLabel "Loss of Resources"@en . + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk-owl:LossSuppliers a rdfs:Class, +risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Suppliers"@en ; - skos:prefLabel "Loss of Suppliers"@en . + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:prefLabel "Lose of Opportunity"@en . -risk-owl:LossTechnologicalAdvantage a rdfs:Class, +risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Technological Advantage"@en ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:prefLabel "Lose of Reputation"@en . -risk-owl:LossTrust a rdfs:Class, +risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Trust"@en ; - skos:prefLabel "Loss of Trust"@en . + skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:prefLabel "Lose of Trust"@en . risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:prefLabel "Material Damage"@en . - -risk-owl:MisinformationDisinformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:definition "Something that acts as or causes Material Damage"@en ; + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Misuse"@en ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:prefLabel "Misuse"@en . -risk-owl:MisuseBreachedInformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Misuse of Breached Information"@en ; - skos:prefLabel "Misuse of Breached Information"@en . - risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes non-material damages"@en ; - skos:prefLabel "Non-Material Damage"@en . + skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk-owl:OrganisationDisruption a rdfs:Class, +risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Organisation Disruption"@en ; - skos:prefLabel "Organisation Disruption"@en . + skos:definition "Risks and issues that arise during operational processes"@en ; + skos:prefLabel "Operational Security Risk"@en . risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Personal Safety Endangerment"@en ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . -risk-owl:PersonnelAbsence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Personnel Absence"@en ; - skos:prefLabel "Personnel Absence"@en . - risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Physical Assault"@en ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . -risk-owl:PhysicalSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Spying"@en ; - skos:prefLabel "Physical Spying"@en . - -risk-owl:PhysicalStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Stalking"@en ; - skos:prefLabel "Physical Stalking"@en . - -risk-owl:PreventExercisingOfRights a rdfs:Class, +risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Prevent Exercising of Rights"@en ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk-owl:PrivacyImpact a rdfs:Class, +risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Privacy impact"@en ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Psychological Harm"@en ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Public Order Breach"@en ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . -risk-owl:RansomwareAttack a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:prefLabel "Ransomware Attack"@en . - risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Re-identification"@en ; - skos:prefLabel "Re-identification"@en . - -risk-owl:RemoteSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Remote Spying"@en ; - skos:prefLabel "Remote Spying"@en . + skos:definition "Something that acts as or causes Re-identification"@en ; + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:prefLabel "Remuneration"@en . -risk-owl:ReplacementCosts a rdfs:Class, +risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Replacement Costs"@en ; - skos:prefLabel "Replacement Costs"@en . + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; + skos:prefLabel "Reputational Risk"@en . -risk-owl:ReputationTrustImpact a rdfs:Class, +risk-owl:Reward a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Reputation and trust impact"@en ; - skos:prefLabel "Reputation and trust impact"@en . + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; + skos:prefLabel "Reward"@en . -risk-owl:RetrievalDeletedData a rdfs:Class, +risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Deleted Data"@en ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk-owl:RetrievalDiscardedEquipment a rdfs:Class, +risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:Impact, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Discarded Equipment"@en ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk-owl:Reward a rdfs:Class, +risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Reward provided as compensation (as an impact)"@en ; - skos:prefLabel "Reward"@en . + skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + +risk-owl:RightsViolation a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Sabotage"@en ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Scam"@en ; + skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . -risk-owl:SecurityBreach a rdfs:Class, +risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Security Breach"@en ; - skos:prefLabel "Security Breach"@en . + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:prefLabel "Security Attack"@en . -risk-owl:ServiceInterruption a rdfs:Class, +risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Service Interruption"@en ; - skos:prefLabel "Service Interruption"@en . + skos:definition "Something that acts as or causes Security Breach"@en ; + skos:prefLabel "Security Breach"@en . risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Sexual Violence"@en ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Social Disadvantage"@en ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . -risk-owl:Spam a rdfs:Class, +risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Spam"@en ; - skos:prefLabel "Spam"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk-owl:Spoofing a rdfs:Class, +risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Spoofing"@en ; - skos:prefLabel "Spoofing"@en . + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:prefLabel "Societal Risk"@en . -risk-owl:Spying a rdfs:Class, +risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Spying"@en ; - skos:prefLabel "Spying"@en . - -risk-owl:Stalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Stalking"@en ; - skos:prefLabel "Stalking"@en . + skos:definition "Something that acts as or causes Spoofing"@en ; + skos:prefLabel "Spoofing"@en . risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Failure"@en ; - skos:prefLabel "System Failure"@en . + skos:definition "Something that acts as or causes System Failure"@en ; + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "System Intrusion"@en ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Malfunction"@en ; - skos:prefLabel "System Malfunction"@en . + skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Terrorism"@en ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:prefLabel "Terrorism"@en . -risk-owl:Theft a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft"@en ; - skos:prefLabel "Theft"@en . - -risk-owl:TheftEquipment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Equipment"@en ; - skos:prefLabel "Theft of Equipment"@en . - -risk-owl:TheftMedia a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Media"@en ; - skos:prefLabel "Theft of Media"@en . - -risk-owl:ThirdPartyOperationDisruption a rdfs:Class, +risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Third Party Operation Disruption"@en ; - skos:prefLabel "Third Party Operation Disruption"@en . + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:prefLabel "Unauthorised Access to Premises"@en . -risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, +risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Access to Premises"@en ; - skos:prefLabel "Unauthorised Access to Premises"@en . + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . -risk-owl:UnauthorisedImpersonation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Unauthorised Impersonation"@en ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Reidentification ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Resource Use"@en ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Access"@en ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . -risk-owl:UnknownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Code Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Data Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk-owl:Vandalism a rdfs:Class, +risk-owl:UserRisks a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; + skos:prefLabel "User Risks"@en . + +risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Vandalism"@en ; - skos:prefLabel "Vandalism"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk-owl:ViolationCodeConduct a rdfs:Class, +risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Code of Conduct"@en ; - skos:prefLabel "Violation of Code of Conduct"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk-owl:ViolationContractualObligations a rdfs:Class, +risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk-owl:ViolationEthicalCode a rdfs:Class, +risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Ethical Code"@en ; - skos:prefLabel "Violation of Ethical Code"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . -risk-owl:ViolationOfRights a rdfs:Class, +risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Rights"@en ; - skos:prefLabel "Violation of Rights"@en . + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:prefLabel "Violating Policy"@en . -risk-owl:ViolationRegulatoryObligations a rdfs:Class, +risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Regulatory Obligations"@en ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk-owl:ViolationStatutoryObligations a rdfs:Class, +risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:definition "Something that acts as or causes Child Violence"@en ; + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk-owl:VulnerabilityCreated a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:InternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Vulnerability Created"@en ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:prefLabel "Vulnerability Created"@en . -risk-owl:VulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Vulnerability Exploited"@en ; - skos:prefLabel "Vulnerability Exploited"@en . - risk-owl:serialisation-html a profile:ResourceDescriptor ; dct:conformsTo ; dct:format ; diff --git a/2.1-dev/risk/modules/risk_consequences-owl.rdf b/2.1-dev/risk/modules/risk_consequences-owl.rdf index 449a28365..a24cf3b5f 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.rdf +++ b/2.1-dev/risk/modules/risk_consequences-owl.rdf @@ -12,2967 +12,1997 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - - https://w3id.org/dpv/risk# - - - - - - - - - http://purl.org/ontology/bibo/status/published - - Fajar Ekaputra - Harshvardhan J. Pandit - Axel Polleres - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Julian Flake - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 - - https://w3id.org/dpv/risk - 2.1-dev - risk - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - - 2022-08-14 - Risk Concepts - - - + + + + + modified + 2024-08-16 + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + Violation of Contractual Obligation 2022-08-17 - Loss of Opportunity Harshvardhan J. Pandit - accepted - - - - Loss of Opportunity - + - - - Abusive Content Utilisation - + + - accepted + Something that acts as or causes Loss of Negotiating Capacity + Harshvardhan J. Pandit 2022-08-17 + accepted + 2024-08-16 - Abusive Content Utilisation - + Lose of Negotiating Capacity + - + + Compensation + + + + + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit accepted + Something that acts as or provides compensation - which can be monetary and financial or in other forms + 2024-08-16 + + + + + Harshvardhan J. Pandit - - + modified + - + 2024-08-16 2022-08-17 - Spam - Spam - + Something that acts as or causes Corruption of Data + Data Corruption + This concept was called "Corruption Data" in DPV 2.0 + - - 2022-10-22 - + + - Consequence for Data Subject - Consequence for Data Subject - Harshvardhan J. Pandit, Georg P. Krog - accepted - - - - - - - accepted + Public Order Breach + Harshvardhan J. Pandit - Business Performance Impairment - - Business Performance Impairment + accepted + 2024-08-16 2022-08-17 - - + Something that acts as or causes Public Order Breach + - - 2022-08-17 - - + + Harshvardhan J. Pandit + accepted + - Equipment Malfunction - Equipment Malfunction - Harshvardhan J. Pandit + 2024-08-16 + 2022-08-17 + Something that acts as or causes a compromised account that is then used by the compromiser + Compromise Account - accepted - + + - - + + 2024-08-16 + accepted + + This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 + Something that acts as or causes Harmful Speech + Exposure to Harmful Speech - Distributed Denial of Service Attack (DDoS) - Distributed Denial of Service Attack (DDoS) - accepted Harshvardhan J. Pandit - - + + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - 2022-08-17 - + + Violation of Rights + - Harshvardhan J. Pandit - + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + Something that acts as or causes Violation of Rights + 2024-08-16 + This concept was called "ViolationOfRights" in DPV 2.0 - Physical Spying accepted - Physical Spying - + - - - + + Security Breach + - Personal Safety Endangerment + Something that acts as or causes Security Breach Harshvardhan J. Pandit - Personal Safety Endangerment + 2024-08-16 + accepted 2022-08-17 - - + + - + + + + - Unauthorised Data Modification - Unauthorised Data Modification accepted - - + + + + 2022-08-17 + Violating Code of Conduct + + + modified + 2024-08-16 Harshvardhan J. Pandit - 2022-08-17 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + + + + + + + Harshvardhan J. Pandit + accepted + Unwanted Data Deletion + 2024-08-16 + 2022-08-17 + Something that acts as or causes Unwanted Data Deletion + - - Harshvardhan J. Pandit, Georg P. Krog + accepted - + - 2022-10-22 + 2024-08-16 + 2022-08-17 + Unauthorised Code Modification - Impact on Data Subject - Impact on Data Subject - + Harshvardhan J. Pandit + + Something that acts as or causes Unauthorised Code Modification + - - + + + Illegal Data Processing + - + 2024-08-16 + Something that acts as or causes Illegal Processing of Data + This concept was called "IllegalProcessingData" in DPV 2.0 + Harshvardhan J. Pandit accepted - Damage by Third Party - - Damage by Third Party + 2022-08-17 - Harshvardhan J. Pandit - + - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - 2024-06-11 - + + 2024-08-16 + - accepted - Misuse - Delaram Golpayegani - Misuse - + accepted + The criteria for what is considered material damage is based in jurisdictional laws and norms + Material Damage + Harshvardhan J. Pandit + 2022-03-30 + Something that acts as or causes Material Damage + - - Unwanted Disclosure of Data - Unwanted Disclosure of Data + 2022-08-17 + Something that acts as or causes Unauthorised Information Disclosure - - + Unauthorised Information Disclosure + - accepted + 2024-08-16 + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + accepted + - - 2022-08-17 - - Retrieval of Deleted Data + Harshvardhan J. Pandit - - + Something that acts as or causes System Malfunction + accepted + - Retrieval of Deleted Data - accepted - - - + 2024-08-16 + - + Here system refers to both hardware and software systems + 2022-08-17 + System Malfunction + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - accepted - Harshvardhan J. Pandit - Business impact - Business impact 2022-08-17 - + + + Something that acts as or causes Spoofing + + Spoofing + accepted + 2024-08-16 + + - - Harshvardhan J. Pandit - + + - Identity Dispute - 2022-08-24 - accepted + 2024-08-16 - Identity Dispute - + Harshvardhan J. Pandit + + 2022-08-17 + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + modified + - - - Georg P. Krog, Harshvardhan J. Pandit - Payment - + + - Payment provided as compensation (as an impact) - 2024-04-14 - accepted - - - + Injury + Harshvardhan J. Pandit accepted - + Something that acts as or causes Injury + + 2024-08-16 2022-08-17 - Financial Equipment Costs - + + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + ENISA Threat Landscape for Ransomware Attacks 2022 + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + accepted + + Something that acts as or causes Account Credentials to be compromised + Compromise Account Credentials + Harshvardhan J. Pandit - Financial Equipment Costs - - - 2022-08-17 - - Harshvardhan J. Pandit - - - - Detriment to Recovery + 2024-08-16 - accepted - Detriment to Recovery - + + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + - - Cost of Judicial Penalties - + + - accepted + Unauthorised Code Disclosure - Cost of Judicial Penalties - 2022-08-17 - Harshvardhan J. Pandit - + Something that acts as or causes Unauthorised Code Disclosure + 2024-08-16 + 2022-08-17 + + accepted + - - Unauthorised System Modification - + + 2022-08-17 + + Harshvardhan J. Pandit - + 2024-08-16 + Something that acts as or causes Physical Assault accepted - Unauthorised System Modification - 2022-08-17 - - + + Physical Assault + - - 2022-08-19 - Social Disadvantage - Georg P. Krog - + + - Social Disadvantage - accepted + 2024-08-16 + Fraud - + + accepted + Something that acts as or causes Fraud + 2022-08-17 + Harshvardhan J. Pandit + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - - + + 2022-08-17 + Blackmail + + Harshvardhan J. Pandit + Something that acts as or causes Blackmail + 2024-08-16 + accepted - - 2022-08-17 - Harshvardhan J. Pandit - Personnel Absence - Personnel Absence - + - + accepted - Harshvardhan J. Pandit - + - Intentional use of software by including or inserting in a system for a harmful purpose - Malicious Code Attack - 2022-08-17 - - + Something that acts as or causes Component Failure + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Component Failure + - - Harshvardhan J. Pandit - - - - Non-Material Damage - - accepted - Impact that acts as or causes non-material damages - 2022-03-30 - - - - - - - Cost of Operation Interruption - accepted - - Cost of Operation Interruption - 2022-08-17 - - Harshvardhan J. Pandit - - - - accepted - - - - Data Breach - - Harshvardhan J. Pandit - - - 2022-08-17 - - Data Breach - - - - - - - - - accepted - Theft of Media - 2022-08-17 - Harshvardhan J. Pandit - Theft of Media - - - - - - - 2022-08-17 - - Harshvardhan J. Pandit - - accepted - Violation of Regulatory Obligations - Violation of Regulatory Obligations - - - - - - - Harmful Speech - accepted - Harshvardhan J. Pandit - - - Harmful Speech - 2022-08-17 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - Phishing Scam - - - - accepted - A type of social engineering attack involving deceptive messages intended to reveal sensitive information - 2022-08-17 - - - Harshvardhan J. Pandit - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - - Primer for Data Privacy Vocabulary - - - - - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - accepted - Harshvardhan J. Pandit - 2022-08-17 - - - - - Unauthorised Data Access - Unauthorised Data Access - - - - - Denial of Service Attack (DoS) - - - - accepted - Harshvardhan J. Pandit - 2022-08-17 - - - Denial of Service Attack (DoS) - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - Loss of Competitive Advantage - - - - Harshvardhan J. Pandit - - accepted - Loss of Competitive Advantage - 2022-08-17 - - - - - - - - Harshvardhan J. Pandit - 2022-08-17 - - Government Crisis - Government Crisis - - accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - accepted - Harshvardhan J. Pandit - - 2022-08-17 - - Public Order Breach - - - - Public Order Breach - - - - Harshvardhan J. Pandit - - - - - Unauthorised Impersonation - accepted - Unauthorised Impersonation - - 2022-08-17 - - - - - 2022-08-17 - Violation of Contractual Obligations - Violation of Contractual Obligations - - - - Harshvardhan J. Pandit - accepted - - - - - - - - accepted - 2022-08-17 - - - Unauthorised Resource Use - Harshvardhan J. Pandit - Unauthorised Resource Use - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - - - - 2022-08-17 - - Harshvardhan J. Pandit - - Unknown Vulnerability Exploited - Unknown Vulnerability Exploited - accepted - - - - - - - Damage - 2022-03-30 - accepted - Harshvardhan J. Pandit - Impact that acts as or causes damages - - - - - - - - - accepted - Harshvardhan J. Pandit - 2022-08-17 - - Brute Force Authorisations - Brute Force Authorisations - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - - - - - accepted - Harshvardhan J. Pandit - 2022-08-17 - - Increase Internal Cost - Increase Internal Cost - - - - - - - Equipment Failure - - Equipment Failure - accepted - 2022-08-17 - - Harshvardhan J. Pandit - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - 2022-08-17 - Loss of Funds - - Loss of Funds - - - - accepted - Harshvardhan J. Pandit - - - - - - - - accepted - Harshvardhan J. Pandit - - - 2022-08-17 - Injury - Injury - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - Georg P. Krog, Harshvardhan J. Pandit - - - - Reward - 2024-04-14 - - accepted - Reward provided as compensation (as an impact) - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - Illegal Processing of Data - Illegal Processing of Data - - 2022-08-17 - - - - Harshvardhan J. Pandit - accepted - - - - Consequence on Data Security - accepted - 2022-10-22 - Harshvardhan J. Pandit, Georg P. Krog - - - - - Consequence on Data Security - - - - - - - Harshvardhan J. Pandit - - Loss of Technological Advantage - accepted - - Loss of Technological Advantage - 2022-08-17 - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - Loss of Assets - Loss of Assets - accepted - - - - Harshvardhan J. Pandit - - 2022-08-17 - - - - 2022-08-17 - - - - - Erroneous System Use - accepted - Erroneous System Use - Harshvardhan J. Pandit - - - - - - - - - accepted - - Identity Fraud - Identity Fraud - Harshvardhan J. Pandit - 2022-08-17 - - - - Harshvardhan J. Pandit - 2022-08-17 - - - - - Theft of Equipment - Theft of Equipment - accepted - - - - - accepted - - - - - Child Violence - 2022-08-17 - Child Violence - Harshvardhan J. Pandit - - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - - 2022-08-17 - - Loss of Suppliers - Loss of Suppliers - - - - accepted - Harshvardhan J. Pandit - - - - - - - accepted - Georg P. Krog, Harshvardhan J. Pandit - Remuneration - - Renumeration provided as compensation (as an impact) - 2024-04-14 - - - - Environmental Safety Endangerment - Environmental Safety Endangerment - 2022-08-17 - Harshvardhan J. Pandit - - accepted - - - - - - - - - - Ransomware Attack - Harshvardhan J. Pandit - 2022-08-17 - - - - Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality - - accepted - - - - accepted - Harshvardhan J. Pandit - - - - - Replacement Costs - 2022-08-17 - - Replacement Costs - - - - - - - Harshvardhan J. Pandit - - Confidentiality Breach - accepted - 2022-08-17 - Confidentiality Breach - - - - - - 2022-08-17 - Internal Operation Disruption - - - - - Harshvardhan J. Pandit - accepted - Internal Operation Disruption - - - - - - - - Guides for Data Privacy Vocabulary - - - - Violation of Rights - 2022-08-18 - - - - accepted - Violation of Rights - Georg P. Krog, Harshvardhan J. Pandit - - - - - - 2022-08-17 - Loss of Goods - - - - - Harshvardhan J. Pandit - Loss of Goods - accepted - - - - - - - accepted - Cost of Judicial Proceedings - - - 2022-08-17 - Harshvardhan J. Pandit - Cost of Judicial Proceedings - - - - - - - 2022-08-17 - - - Reputation and trust impact - accepted - Harshvardhan J. Pandit - Reputation and trust impact - - - - - - - accepted - Unwanted Code Deletion - 2022-08-17 - - - Harshvardhan J. Pandit - Unwanted Code Deletion - - - - - - - - - accepted - 2022-08-17 - Spying - Spying - Harshvardhan J. Pandit - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - Harshvardhan J. Pandit - - - - - Scam - accepted - Scam - 2022-08-17 - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - Discrimination - Discrimination - 2022-08-19 - accepted - - - - Georg P. Krog - - - - - 2022-08-17 - - - - Harshvardhan J. Pandit - accepted - System Intrusion - - - System Intrusion - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - accepted - System Malfunction - 2022-08-17 - System Malfunction - - - - Harshvardhan J. Pandit - - - - - - 2022-08-17 - Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - - - - - - Harshvardhan J. Pandit - accepted - Malware Attack - - - - Spoofing - Spoofing - 2022-08-17 - - - - - Harshvardhan J. Pandit - - accepted - - - - - - Risk Concepts - N3 serialiation - - - - - - Vandalism - 2022-08-17 - - - - - Harshvardhan J. Pandit - Vandalism - - accepted - - - - - - - - Loss of Trust - accepted - - Loss of Trust - 2022-08-17 - Harshvardhan J. Pandit - - - - Unauthorised Data Disclosure - accepted - Harshvardhan J. Pandit - - - - 2022-08-17 - - - Unauthorised Data Disclosure - - - - 2022-08-17 - Sabotage - + - - - Harshvardhan J. Pandit accepted - Sabotage - - - - - - + 2024-08-16 2022-08-17 - - Human Errors - - accepted - Human Errors - Harshvardhan J. Pandit - - - - Health and life impact - + Something that acts as or causes Unauthorised Access to Premises + + Unauthorised Access to Premises + - accepted - Harshvardhan J. Pandit - 2022-08-17 - - - Health and life impact - + - - + + Delaram Golpayegani + - 2022-08-17 + Something that acts as or causes Misuse + 2024-08-16 - + Misuse accepted - Harshvardhan J. Pandit - Identity Theft - Identity Theft - + 2024-06-11 + - - - - - Economic Disadvantage - accepted + + + Axel Polleres + Julian Flake + Fajar Ekaputra + Beatriz Esteves + Delaram Golpayegani Georg P. Krog - - Economic Disadvantage - 2022-08-19 - - - - - - - 2022-08-17 - - Cost of Suspended Operations - Harshvardhan J. Pandit - Cost of Suspended Operations - - accepted - - - - - Unauthorised Access to Premises - - - - accepted - Harshvardhan J. Pandit - 2022-08-17 - - Unauthorised Access to Premises - - - - - - - Harshvardhan J. Pandit - accepted - - Danger to Personnel - Danger to Personnel - 2022-08-17 - - - - Unauthorised Re-Identification - - Georg P. Krog - 2022-08-19 - - - - Unauthorised Re-Identification - accepted - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev + https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + + + + + + + + 2.1-dev + 10.5281/zenodo.12505841 + + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + + 2022-08-14 + http://purl.org/ontology/bibo/status/published + RISK + Risk Concepts + + + risk - + - + - accepted - Loss of Control over Data - Loss of Control over Data - - 2022-08-19 + 2024-04-14 Georg P. Krog, Harshvardhan J. Pandit - - - - 2022-08-17 - - Harshvardhan J. Pandit - - - - - Stalking - accepted - Stalking - + Fee + DGA 2.10 + Something that acts as or provides fees e.g. for using a service + modified + 2024-08-16 + + - - 2022-08-17 - Harshvardhan J. Pandit - + + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + + Detriment accepted - - Business disruption - Business disruption - + 2024-08-16 + 2022-03-23 + Something that acts as or causes Detriment + - - accepted - - Harshvardhan J. Pandit - - - + + 2022-08-17 + Something that acts as or causes Loss of Customer Confidence - Vulnerability Exploited - Vulnerability Exploited - - - - accepted - Fraud - Harshvardhan J. Pandit - + Lose of Customer Confidence + - Fraud - 2022-08-17 - - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + Harshvardhan J. Pandit + 2024-08-16 + accepted + - + + - + + Something that acts as or causes Identity Theft + Harshvardhan J. Pandit + Identity Theft accepted - Psychological Harm - Psychological Harm - + 2024-08-16 2022-08-17 - - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + - - Violation of Code of Conduct - accepted - Harshvardhan J. Pandit - + + + Violence against children - Violation of Code of Conduct - - 2022-08-17 - - - + Harshvardhan J. Pandit + Something that acts as or causes Child Violence + 2024-08-16 2022-08-17 - - Known Vulnerability Exploited + This concept was called "ChildViolence" in DPV 2.0 + accepted - - Harshvardhan J. Pandit - - - - Known Vulnerability Exploited - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + - + - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - Cost of Installation - + + Accidental Misuse + Accidental Misuse + - Harshvardhan J. Pandit - accepted - - Cost of Installation - 2022-08-17 - + accepted + - + + Something that acts as or causes Data Breach accepted - Harshvardhan J. Pandit - + + + + 2024-08-16 2022-08-17 + Data Breach + Harshvardhan J. Pandit + - Financial Personnel Costs - - Financial Personnel Costs - + - - - + + + Something that acts as or causes Terrorism + Harshvardhan J. Pandit - Authorisation Failure - Authorisation Failure + 2024-08-16 + + Terrorism accepted 2022-08-17 - - + - - - Loss of Reputation - + + - accepted + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques Harshvardhan J. Pandit 2022-08-17 + accepted + Brute Force Authorisations + 2024-08-16 + - Loss of Reputation - + - + + - - Cost of Configuration + + Something that acts as or causes Component Malfunction + Component Malfunction + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted + + + + Unauthorised System Modification + Harshvardhan J. Pandit + accepted + + + + + 2024-08-16 2022-08-17 - Cost of Configuration - Harshvardhan J. Pandit - - + Something that acts as or causes Unauthorised System Modification + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - 2022-08-18 - + + accepted - Georg P. Krog, Harshvardhan J. Pandit - Limitation of Rights - Limitation of Rights - - - - - - - - Risk Concepts - RDF/XML serialiation - + - - + Harshvardhan J. Pandit - + accepted + - - accepted - Eavesdropping - Eavesdropping + 2024-08-16 2022-08-17 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - Harm - 2022-08-13 - Impact that acts as or causes harms - + Here system refers to both hardware and software systems + Something that acts as or causes System Failure + System Failure + + + + + 2024-08-16 + 2022-08-17 + + Harshvardhan J. Pandit + Sexual Violence accepted - + + Something that acts as or causes Sexual Violence + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + + 2024-08-16 2022-08-17 - - - Harshvardhan J. Pandit - - - - accepted - Loss of Customer Confidence - Loss of Customer Confidence - - - - accepted - Harshvardhan J. Pandit - + - - Physical Stalking - 2022-08-17 - Physical Stalking + + Phishing Scam + Something that acts as or causes Phishing Scam - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Harshvardhan J. Pandit + accepted + - - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + + - 2022-08-17 + This concept was called "PreventExercisingOfRights" in DPV 2.0 + Something that acts as or causes Prevent Exercising of Rights - Physical Assault - Physical Assault + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + 2024-08-16 + Prevent Exercising of Rights accepted - Harshvardhan J. Pandit - - + - - Harshvardhan J. Pandit + + Something that acts as or causes Erroneous System Use + 2022-08-17 + Erroneous System Use - + - accepted - Unwanted Data Deletion - - 2022-08-17 + Harshvardhan J. Pandit + 2024-08-16 + - Unwanted Data Deletion - - - - - Service Interruption accepted - 2022-08-17 - - Harshvardhan J. Pandit - Service Interruption - + + + + modified + Something that acts as or causes Violation of Ethics Code + - - - - Cyber Spying - accepted + 2024-08-16 2022-08-17 + Violating Ethics Code + - Cyber Spying - - - + This concept was called "ViolationEthicalCode" in DPV 2.0 Harshvardhan J. Pandit - - + - - System Failure - - - - 2022-08-17 - + - System Failure + Something that acts as or causes Distributed Denial of Service Attack (DDoS) accepted - Harshvardhan J. Pandit - - - 2022-08-17 - - Terrorism - + Distributed Denial of Service Attack (DDoS) + + - accepted Harshvardhan J. Pandit - Terrorism - - + 2024-08-16 + - - Extorsion + + + + + Something that acts as or causes Psychological Harm - - Extorsion - 2022-08-17 Harshvardhan J. Pandit + Psychological Harm accepted - - - - - - + 2024-08-16 2022-08-17 + + + + - Vulnerability Created - Vulnerability Created - + - - accepted + + Lose of Trust Harshvardhan J. Pandit - + 2022-08-17 + accepted + 2024-08-16 + Something that acts as or causes Loss of Trust + - - Corruption of Data - + + 2024-08-16 + Something that acts as or causes Malicious Code Attack + accepted - Harshvardhan J. Pandit - + - Corruption of Data + Harshvardhan J. Pandit 2022-08-17 + Malicious Code Attack - + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - - Law Enforcement Adverse Effects - Law Enforcement Adverse Effects - - + + - accepted - Harshvardhan J. Pandit + 2024-08-16 2022-08-17 - + Something that acts as or causes Violation of Statutory Obligations + Violation of Statutory Obligations + + Harshvardhan J. Pandit + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + modified + - - accepted + + Harshvardhan J. Pandit - + + accepted + 2024-08-16 + Lose of Goodwill + - - Citizens impact 2022-08-17 - - Citizens impact - + Something that acts as or causes Loss of Goodwill + - - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + 2022-08-17 + - accepted + Something that acts as or causes Personal Safety Endangerment - - Compromise Account - 2022-08-17 - Compromise Account Harshvardhan J. Pandit - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + Personal Safety Endangerment + 2024-08-16 + + accepted + - - - Misinformation and Disinformation + accepted - Harshvardhan J. Pandit - + - Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) + Harshvardhan J. Pandit 2022-08-17 + Something that acts as or causes Vulnerability Created - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + 2024-08-16 + Vulnerability Created + - - Danger to Customers - Danger to Customers - + + Something that acts as or causes Confidentiality Breach + Confidentiality Breach + - accepted - Harshvardhan J. Pandit - + 2024-08-16 + 2022-08-17 - - - - - - - - Risk Concepts - Turtle serialiation - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - Security Breach - Security Breach - 2022-08-17 - - - + Harshvardhan J. Pandit + accepted + + + + + Privacy + accepted + + + + + Something that acts as or causes Malware Attack accepted + + + Harshvardhan J. Pandit - + 2024-08-16 + 2022-08-17 + + + Malware Attack + - - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - ENISa Trust Services Security Incidents 2021 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + accepted + + + + + Internal Security Threat + Concepts associated with security threats and issues that originate within the organisation + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - + + + Harshvardhan J. Pandit - Financial Investigation Costs + 2024-08-16 + Something that acts as or causes Human Errors accepted - Financial Investigation Costs + Human Errors 2022-08-17 - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - ISO/IEC 27005:2018 + + ENISA Threat Taxonomy 2016 - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + + Lose of Reputation + + + + + Harshvardhan J. Pandit + 2022-08-17 + accepted + 2024-08-16 + Something that acts as or causes Loss of Reputation + - - + + + Lose of Opportunity + + Something that acts as or causes Loss of Opportunity + + Harshvardhan J. Pandit + 2024-08-16 accepted - Loss of Credibility 2022-08-17 - Loss of Credibility + + + + + + + Something that acts as or causes Unauthorised Resource Use + Unauthorised Resource Use Harshvardhan J. Pandit - - + 2024-08-16 + 2022-08-17 + + accepted + - - Harshvardhan J. Pandit - Misuse of Breached Information + + Risks and issues that affect or have the potential to affect specific individuals + Individual Risk accepted - - - Misuse of Breached Information - 2022-08-17 - - - - Georg P. Krog, Harshvardhan J. Pandit - + + 2022-08-17 + Something that acts as or causes Unauthorised Data Modification + Unauthorised Data Modification + + - 2024-04-14 + Harshvardhan J. Pandit + 2024-08-16 + accepted - Compensation - Compensation provided (as an impact) - + - - 2022-03-23 - + + Guides for Data Privacy Vocabulary + + + + + + + + - Detriment - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - Impact that acts as or causes detriments + Societal Health & Safety accepted - + + - - Examples for Data Privacy Vocabulary - - + + + + - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - Compliance impact - + + + + accepted + Risks and issues that affect or have the potential to affect society at large or specific groups in society + Societal Risk + + + accepted - Compliance impact + Something that acts as or causes Impact to Rights Harshvardhan J. Pandit - 2022-08-17 + + + + Impact to Rights + This concept was called "ImpactToRights" in DPV 2.0 - + + 2024-08-16 + + - - accepted - - Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency - Cryptojacking - 2022-08-17 - Harshvardhan J. Pandit - + + + Something that acts as or causes Social Disadvantage + Social Disadvantage + 2022-08-19 - + accepted + Georg P. Krog + 2024-08-16 + - - - Compromise Account Credentials + + + accepted - + Authorisation Failure + Harshvardhan J. Pandit - Compromise Account Credentials + 2024-08-16 2022-08-17 - - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + Something that acts as or causes Authorisation Failure + - + + + - - Cyber Stalking - Cyber Stalking - + accepted + 2024-08-16 + Something that acts as or causes Identity Fraud Harshvardhan J. Pandit + Identity Fraud 2022-08-17 + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + Primer for Data Privacy Vocabulary + + + + + Things that cause or have the potential to impact financial resources + + + - + accepted + Financial Impact + - Financial Loss - accepted - Financial Loss - Harshvardhan J. Pandit - + + 2024-08-16 2022-08-17 - - + Financial Loss + + Harshvardhan J. Pandit + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + accepted + - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + Risks and issues that have their origin in environment or can affect the environment at large + accepted + Environmental Risk + - - + + Harshvardhan J. Pandit + accepted + + + + Re-identification + 2024-08-16 + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 - 2022-08-17 - + Something that acts as or causes Re-identification + + + + Coercion + + Harshvardhan J. Pandit - Industrial Crisis - Industrial Crisis accepted - + Something that acts as or causes Coercion + 2024-08-16 + 2022-08-17 + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - - 2022-08-17 - - Attack on Private Life - + + + Cryptojacking Harshvardhan J. Pandit + Something that acts as or causes Cryptojacking + + accepted - Attack on Private Life - - + 2024-08-16 + 2022-08-17 + - + + ENISA Reference Incident Classification Taxonomy 2018 - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - + + Equipment Failure + - Coercion - accepted - Harshvardhan J. Pandit - - Coercion - 2022-08-17 + - - - - Unauthorised Information Disclosure - - - Harshvardhan J. Pandit - - Unauthorised Information Disclosure - - accepted + Here equipment refers to physical equipment + 2024-08-16 2022-08-17 - + accepted + Something that acts as or causes Equipment Failure + - + 2022-08-17 - Harshvardhan J. Pandit - Organisation Disruption - - + + + - Organisation Disruption + Harshvardhan J. Pandit + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + 2024-08-16 accepted - + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - + Harshvardhan J. Pandit - - + + 2022-03-30 + Non-Material Damage + Something that acts as or causes Non-Material Damage + 2024-08-16 + The criteria for what is considered material damage is based in jurisdictional laws and norms accepted - Cost of Backup - Cost of Backup - 2022-08-17 - + - - accepted - Harshvardhan J. Pandit - Interception of Communications - - 2022-08-17 + - - - - Interception of Communications - - - + Something that acts as or causes benefits - + + Benefit + 2024-08-16 + 2022-03-23 accepted - - Violation of Ethical Code - - 2022-08-17 - Violation of Ethical Code - Harshvardhan J. Pandit - + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + - - Harshvardhan J. Pandit - Violation of Statutory Obligations - 2022-08-17 - - + + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + - Violation of Statutory Obligations + 2024-08-16 + accepted - - + Reward + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + - - https://www.iso.org/standard/75281.html + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - ISO/IEC 27005:2018 - - accepted - Unauthorised System Access - Harshvardhan J. Pandit - Unauthorised System Access - - + + Judicial Costs + - 2022-08-17 - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + accepted + Something that involves or causes judicial costs to be paid + - - 2022-08-17 - Harshvardhan J. Pandit - - + + Georg P. Krog, Harshvardhan J. Pandit + Something that acts as or provides payment e.g. to access a service or purchase resources + accepted + - Blackmail - Blackmail + 2024-08-16 - accepted - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + 2024-04-14 + Payment + - - - + + Concepts associated with security threats that are likely to originate externally + accepted + - accepted - Harshvardhan J. Pandit - 2022-08-17 - Unauthorised Code Modification - Unauthorised Code Modification - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + External Security Threat + - - + + + 2024-04-14 - Loss of Resources + Something that acts as or provides renumeration which is in monetary or financial form + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit accepted - - 2022-08-17 - Loss of Resources - Harshvardhan J. Pandit - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + Remuneration + - - - 2022-08-17 - - Harshvardhan J. Pandit - Impact to Rights - Impact to Rights - + + + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it accepted - + - - - + + - Risk Concepts - HTML serialiation - - + + + Risk Concepts - JSON-LD serialiation + - - - Fee provided as compensation (as an impact) - + + - Georg P. Krog, Harshvardhan J. Pandit - Fee - 2024-04-14 - DGA 2.10 + 2024-08-16 + 2022-08-17 + Something that acts as or causes Unwanted Disclosure of Data + + Unwanted Disclosure of Data + Harshvardhan J. Pandit + accepted - + - - https://www.iso.org/standard/75281.html + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - ISO/IEC 27005:2018 - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - - + + + 2024-08-16 2022-08-17 - Loss of Customers - Loss of Customers accepted + Something that acts as or causes Loss of Credibility + + Lose of Credibility + Harshvardhan J. Pandit + + + + This concept was called "InterceptionCommunications" in DPV 2.0 + Harshvardhan J. Pandit - + Something that acts as or causes Interception of Communications + 2022-08-17 + + + + + modified + Intercept Communications + 2024-08-16 + - - + + 2024-08-16 + - Theft - - accepted 2022-08-17 - Theft + + Something that acts as or causes Unwanted Code Deletion + Unwanted Code Deletion Harshvardhan J. Pandit - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + accepted + - - 2022-08-17 + - Harshvardhan J. Pandit - Privacy impact - + accepted + - Privacy impact - accepted - - + Concepts associated with risks that arise due to User or Human use + User Risks + - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + - - 2022-08-17 + - - Third Party Operation Disruption - Harshvardhan J. Pandit - + - Third Party Operation Disruption accepted - + Judicial Penalty + Something that involves or causes judicial penalties to be paid + - - Benefit - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - accepted - 2022-03-23 - + + - Impact(s) that acts as or causes benefits - - - - - Copyright Violation + 2024-08-16 2022-08-17 - Harshvardhan J. Pandit - - - + + Something that acts as or causes Extorsion + Harshvardhan J. Pandit accepted - - Copyright Violation - + Extorsion + - - + + 2022-08-13 + Harshvardhan J. Pandit accepted - Loss of Proprietary Information - 2022-08-17 - + - Loss of Proprietary Information - Harshvardhan J. Pandit + Something that acts as or causes Harm to humans + 2024-08-16 + Harm + This concept refers to the general abstract notion of harm - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + - - Loss of Negotiating Capacity - 2022-08-17 - - - + + - Harshvardhan J. Pandit + Something that acts as or causes Discrimination accepted - Loss of Negotiating Capacity - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments + Georg P. Krog + 2024-08-16 + 2022-08-19 + Discrimination + + - - - 2022-08-17 - Harshvardhan J. Pandit - Unauthorised Code Disclosure - + + - Unauthorised Code Disclosure + Something that acts as or causes violation of policy which can be either internal or external policy accepted - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + Violating Policy + - - ENISA Threat Landscape 2021 + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + + Harshvardhan J. Pandit + + + + Something that acts as or causes Scam + 2024-08-16 + accepted + 2022-08-17 + Scam + + + - - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 + - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - + + Something that acts as or causes Equipment Malfunction + Equipment Malfunction + + Here equipment refers to physical equipment - 2022-03-30 - Impact that acts as or causes material damages - accepted + Harshvardhan J. Pandit - Material Damage - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - accepted - Loss of Data - + 2024-08-16 2022-08-17 - Loss of Data + + + Harshvardhan J. Pandit - + Damage + accepted + - + 2024-08-16 + + 2022-03-30 + Something that acts as or causes Damage + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + Harshvardhan J. Pandit + + accepted + 2022-08-17 + + + + + Something that acts as or causes Copyright Violation + 2024-08-16 + Copyright Violation + - + + + + + Unauthorised Re-Identification + 2022-08-19 + Something that acts as or causes Unauthorised Re-Identification + + Georg P. Krog + 2024-08-16 accepted - Loss of Goodwill + + + + Something that acts as or causes Unauthorised Data Disclosure Harshvardhan J. Pandit - Loss of Goodwill - - + Unauthorised Data Disclosure + + + + + 2024-08-16 + + accepted + 2022-08-17 + + + + + Physical Harm + + accepted + + + + 2024-08-16 2022-08-17 - + + + + + Something that acts as or causes Unauthorised System Access + Unauthorised System Access + Harshvardhan J. Pandit + accepted + - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - ENISA Reference Incident Classification Taxonomy 2018 + - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.iso.org/standard/75281.html - ENISA Methodology for Sectoral Cybersecurity Assessments + ISO/IEC 27005:2018 + + + + Risk Concepts - Turtle serialiation + + + + + + + + + + + Individual Health & Safety + accepted + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + Legal Risk accepted - Harshvardhan J. Pandit - Re-identification - + - 2022-08-19 - Re-identification - + Risks and issues that have their basis in legal requirements and enforcement + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Sabotage + + Something that acts as or causes Sabotage + 2024-08-16 + Harshvardhan J. Pandit + accepted + + 2022-08-17 + - - + + accepted + Harshvardhan J. Pandit 2022-08-17 - Retrieval of Discarded Equipment - - Retrieval of Discarded Equipment - accepted - + + 2024-08-16 + Something that acts as or causes Unauthorised Code Access + Unauthorised Code Access + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + accepted + Reputational Risk + + Risks and issues that affect the reputation of the organisation + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 + + accepted + + + + Risks and issues that arise during operational processes + + Operational Security Risk + - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments + + + + + + 2024-08-16 + System Intrusion + Something that acts as or causes System Intrusion + accepted + Harshvardhan J. Pandit + 2022-08-17 + + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + Risk Concepts - N3 serialiation + + + + + + Unauthorised Activity + + + + Something that acts as or causes Unauthorised Activity + + accepted + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + + + + + Risk Concepts - RDF/XML serialiation + + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - Harshvardhan J. Pandit - - - - - - accepted - Financial Repair Costs - Financial Repair Costs - 2022-08-17 - - - - - - Risk Concepts - JSON-LD serialiation - - - - - + 2022-08-17 - Harshvardhan J. Pandit - Remote Spying - Remote Spying - + + + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Data Access + Unauthorised Data Access + 2024-08-16 accepted - - + - - + + Georg P. Krog, Harshvardhan J. Pandit + This concept was called "LimitationOfRights" in DPV 2.0 + Something that acts as or causes Limitation of Rights + - 2022-08-17 + Limitation of Rights + 2022-08-18 + 2024-08-16 - - Unauthorised Code Access accepted - Harshvardhan J. Pandit - Unauthorised Code Access - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html + + ENISA Reference Incident Classification Taxonomy 2018 - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - ENISA Methodology for Sectoral Cybersecurity Assessments + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - 2022-08-17 - - Compromise Account Security - - accepted - Harshvardhan J. Pandit - Compromise Account Security - - - - - - + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view ENISA Threat Taxonomy 2016 - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - ENISA Threat Taxonomy 2016 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - https://www.iso.org/standard/75281.html + - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - ENISA Threat Taxonomy 2016 + - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Methodology for Sectoral Cybersecurity Assessments + ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - - 2022-08-17 - - Sexual Violence - - Sexual Violence - accepted - Harshvardhan J. Pandit - - - - - - - Cost of Acquisition - Cost of Acquisition - accepted - 2022-08-17 - - - Harshvardhan J. Pandit - - - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + ENISa Trust Services Security Incidents 2021 - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 + - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - 2022-08-18 - + + accepted + Intentional Misuse + - Prevent Exercising of Rights - accepted - Georg P. Krog, Harshvardhan J. Pandit - Prevent Exercising of Rights - + Intentional Misuse + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 - - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + + + + Risk Concepts - HTML serialiation + + + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + diff --git a/2.1-dev/risk/modules/risk_consequences-owl.ttl b/2.1-dev/risk/modules/risk_consequences-owl.ttl index e8677041a..100050053 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.ttl +++ b/2.1-dev/risk/modules/risk_consequences-owl.ttl @@ -15,2261 +15,1549 @@ @prefix vann: . @prefix xsd: . -risk-owl:AbusiveContentUtilisation a rdfs:Class, +risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Abusive Content Utilisation"@en ; - skos:prefLabel "Abusive Content Utilisation"@en . - -risk-owl:AttackonPrivateLife a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Attack on Private Life"@en ; - skos:prefLabel "Attack on Private Life"@en . + skos:definition "Accidental Misuse"@en ; + skos:prefLabel "Accidental Misuse"@en . risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Authorisation Failure"@en ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . +risk-owl:AvailabilityBreach a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Blackmail"@en ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Brute Force Authorisations"@en ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . -risk-owl:BusinessImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Business impact"@en ; - skos:prefLabel "Business impact"@en . - -risk-owl:BusinessPerformanceImpairment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business Performance Impairment"@en ; - skos:prefLabel "Business Performance Impairment"@en . - -risk-owl:Businessdisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business disruption"@en ; - skos:prefLabel "Business disruption"@en . - -risk-owl:ChildViolence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Child Violence"@en ; - skos:prefLabel "Child Violence"@en . - -risk-owl:CitizensImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Citizens impact"@en ; - skos:prefLabel "Citizens impact"@en . - risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Coercion"@en ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Benefit ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . -risk-owl:ComplianceImpact a rdfs:Class, +risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compliance impact"@en ; - skos:prefLabel "Compliance impact"@en . + skos:definition "Something that acts as or causes Component Failure"@en ; + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccount a rdfs:Class, +risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account"@en ; - skos:prefLabel "Compromise Account"@en . + skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccountCredentials a rdfs:Class, +risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Credentials"@en ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:prefLabel "Compromise Account"@en . -risk-owl:CompromiseAccountSecurity a rdfs:Class, +risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Security"@en ; - skos:prefLabel "Compromise Account Security"@en . + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Confidentiality Breach"@en ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . -risk-owl:ConsequenceForDataSubject a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence for Data Subject"@en ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk-owl:ConsequenceOnDataSecurity a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence on Data Security"@en ; - skos:prefLabel "Consequence on Data Security"@en . - risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Copyright Violation"@en ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . -risk-owl:CorruptionData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Corruption of Data"@en ; - skos:prefLabel "Corruption of Data"@en . - -risk-owl:CostAcquisition a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Acquisition"@en ; - skos:prefLabel "Cost of Acquisition"@en . - -risk-owl:CostBackup a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Backup"@en ; - skos:prefLabel "Cost of Backup"@en . - -risk-owl:CostConfiguration a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Configuration"@en ; - skos:prefLabel "Cost of Configuration"@en . - -risk-owl:CostInstallation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Installation"@en ; - skos:prefLabel "Cost of Installation"@en . - -risk-owl:CostJudicialPenalties a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk-owl:CostJudicialProceedings a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk-owl:CostOperationInterruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Operation Interruption"@en ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk-owl:CostSuspendedOperations a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Suspended Operations"@en ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . -risk-owl:CyberSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Spying"@en ; - skos:prefLabel "Cyber Spying"@en . - -risk-owl:CyberStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Stalking"@en ; - skos:prefLabel "Cyber Stalking"@en . - risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . -risk-owl:DamageByThirdParty a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Damage by Third Party"@en ; - skos:prefLabel "Damage by Third Party"@en . - -risk-owl:DangertoCustomers a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Danger to Customers"@en ; - skos:prefLabel "Danger to Customers"@en . - -risk-owl:DangertoPersonnel a rdfs:Class, +risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex-owl:E0069, + dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Danger to Personnel"@en ; - skos:prefLabel "Danger to Personnel"@en . + skos:definition "Something that acts as or causes Data Breach"@en ; + skos:prefLabel "Data Breach"@en . -risk-owl:DataBreach a rdfs:Class, +risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex-owl:E0069, - dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Data Breach"@en ; - skos:prefLabel "Data Breach"@en . + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . -risk-owl:DetrimentToRecovery a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Detriment to Recovery"@en ; - skos:prefLabel "Detriment to Recovery"@en . - risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Discrimination"@en ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk-owl:Eavesdropping a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Eavesdropping"@en ; - skos:prefLabel "Eavesdropping"@en . - -risk-owl:EconomicDisadvantage a rdfs:Class, +risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Economic Disadvantage"@en ; - skos:prefLabel "Economic Disadvantage"@en . + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; + skos:prefLabel "Environmental Risk"@en . -risk-owl:EnvironmentalSafetyEndangerment a rdfs:Class, +risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Environmental Safety Endangerment"@en ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:EquipmentFailure a rdfs:Class, +risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Equipment Failure"@en ; - skos:prefLabel "Equipment Failure"@en . + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:EquipmentMalfunction a rdfs:Class, +risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Equipment Malfunction"@en ; - skos:prefLabel "Equipment Malfunction"@en . + skos:definition "Something that acts as or causes Erroneous System Use"@en ; + skos:prefLabel "Erroneous System Use"@en . -risk-owl:ErroneousSystemUse a rdfs:Class, +risk-owl:ExposureToHarmfulSpeech a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Erroneous System Use"@en ; - skos:prefLabel "Erroneous System Use"@en . + skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk-owl:ExternalSecurityThreat a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:prefLabel "External Security Threat"@en . risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Extorsion"@en ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:Fee a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; - sw:term_status "accepted"@en ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + rdfs:subClassOf risk-owl:FinancialImpact ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:prefLabel "Fee"@en . -risk-owl:FinancialEquipmentCosts a rdfs:Class, +risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Financial Equipment Costs"@en ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk-owl:FinancialInvestigationCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Investigation Costs"@en ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:definition "Things that cause or have the potential to impact financial resources"@en ; + skos:prefLabel "Financial Impact"@en . risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Financial Loss"@en ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . -risk-owl:FinancialPersonnelCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Personnel Costs"@en ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk-owl:FinancialRepairCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Repair Costs"@en ; - skos:prefLabel "Financial Repair Costs"@en . - risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Fraud"@en ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . -risk-owl:GovernmentCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Government Crisis"@en ; - skos:prefLabel "Government Crisis"@en . - risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes harms"@en ; - skos:prefLabel "Harm"@en . - -risk-owl:HarmfulSpeech a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Harmful Speech"@en ; - skos:prefLabel "Harmful Speech"@en . - -risk-owl:HealthLifeImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Health and life impact"@en ; - skos:prefLabel "Health and life impact"@en . + skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Human Errors"@en ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:prefLabel "Human Errors"@en . -risk-owl:IdentityDispute a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Identity Dispute"@en ; - skos:prefLabel "Identity Dispute"@en . - risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Fraud"@en ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Theft"@en ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . -risk-owl:IllegalProcessingData a rdfs:Class, +risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Illegal Processing of Data"@en ; - skos:prefLabel "Illegal Processing of Data"@en . + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . -risk-owl:ImpactOnDataSubject a rdfs:Class, +risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact on Data Subject"@en ; - skos:prefLabel "Impact on Data Subject"@en . - -risk-owl:ImpactToRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en . - -risk-owl:IncreaseInternalCost a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Increase Internal Cost"@en ; - skos:prefLabel "Increase Internal Cost"@en . - -risk-owl:IndustrialCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Industrial Crisis"@en ; - skos:prefLabel "Industrial Crisis"@en . - -risk-owl:Injury a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Injury"@en ; - skos:prefLabel "Injury"@en . - -risk-owl:InterceptionCommunications a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Interception of Communications"@en ; - skos:prefLabel "Interception of Communications"@en . - -risk-owl:InternalOperationDisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Internal Operation Disruption"@en ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk-owl:KnownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk-owl:LawEnforcementAdverseEffects a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . - -risk-owl:LimitationOfRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Limitation of Rights"@en ; - skos:prefLabel "Limitation of Rights"@en . - -risk-owl:LossAssets a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Assets"@en ; - skos:prefLabel "Loss of Assets"@en . - -risk-owl:LossCompetitiveAdvantage a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:prefLabel "Loss of Competitive Advantage"@en . - -risk-owl:LossControlOverData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Control over Data"@en ; - skos:prefLabel "Loss of Control over Data"@en . - -risk-owl:LossCredibility a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Credibility"@en ; - skos:prefLabel "Loss of Credibility"@en . - -risk-owl:LossCustomerConfidence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + rdfs:subClassOf risk-owl:IndividualRisk ; + sw:term_status "accepted"@en ; + skos:prefLabel "Individual Health & Safety"@en . + +risk-owl:IndividualRisk a rdfs:Class, + owl:Class ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; sw:term_status "accepted"@en ; - skos:definition "Loss of Customer Confidence"@en ; - skos:prefLabel "Loss of Customer Confidence"@en . + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; + skos:prefLabel "Individual Risk"@en . -risk-owl:LossCustomers a rdfs:Class, +risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Customers"@en ; - skos:prefLabel "Loss of Customers"@en . + skos:definition "Something that acts as or causes Injury"@en ; + skos:prefLabel "Injury"@en . -risk-owl:LossData a rdfs:Class, +risk-owl:IntegrityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + +risk-owl:IntentionalMisuse a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Loss of Data"@en ; - skos:prefLabel "Loss of Data"@en . + skos:definition "Intentional Misuse"@en ; + skos:prefLabel "Intentional Misuse"@en . -risk-owl:LossFunds a rdfs:Class, +risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . + +risk-owl:InternalSecurityThreat a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Funds"@en ; - skos:prefLabel "Loss of Funds"@en . + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; + skos:prefLabel "Internal Security Threat"@en . -risk-owl:LossGoods a rdfs:Class, +risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Loss of Goods"@en ; - skos:prefLabel "Loss of Goods"@en . + skos:definition "Something that involves or causes judicial costs to be paid"@en ; + skos:prefLabel "Judicial Costs"@en . -risk-owl:LossGoodwill a rdfs:Class, +risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Loss of Goodwill"@en ; - skos:prefLabel "Loss of Goodwill"@en . + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; + skos:prefLabel "Judicial Penalty"@en . -risk-owl:LossNegotiatingCapacity a rdfs:Class, +risk-owl:LegalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Negotiating Capacity"@en ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:prefLabel "Legal Risk"@en . -risk-owl:LossOpportunity a rdfs:Class, +risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Opportunity"@en ; - skos:prefLabel "Loss of Opportunity"@en . + skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:prefLabel "Lose of Credibility"@en . -risk-owl:LossProprietaryInformation a rdfs:Class, +risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Proprietary Information"@en ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:prefLabel "Lose of Customer Confidence"@en . -risk-owl:LossReputation a rdfs:Class, +risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Reputation"@en ; - skos:prefLabel "Loss of Reputation"@en . + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:prefLabel "Lose of Goodwill"@en . -risk-owl:LossResources a rdfs:Class, +risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Resources"@en ; - skos:prefLabel "Loss of Resources"@en . + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk-owl:LossSuppliers a rdfs:Class, +risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Suppliers"@en ; - skos:prefLabel "Loss of Suppliers"@en . + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:prefLabel "Lose of Opportunity"@en . -risk-owl:LossTechnologicalAdvantage a rdfs:Class, +risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Technological Advantage"@en ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:prefLabel "Lose of Reputation"@en . -risk-owl:LossTrust a rdfs:Class, +risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Trust"@en ; - skos:prefLabel "Loss of Trust"@en . + skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:prefLabel "Lose of Trust"@en . risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:prefLabel "Material Damage"@en . - -risk-owl:MisinformationDisinformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:definition "Something that acts as or causes Material Damage"@en ; + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Misuse"@en ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:prefLabel "Misuse"@en . -risk-owl:MisuseBreachedInformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Misuse of Breached Information"@en ; - skos:prefLabel "Misuse of Breached Information"@en . - risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes non-material damages"@en ; - skos:prefLabel "Non-Material Damage"@en . + skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk-owl:OrganisationDisruption a rdfs:Class, +risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Organisation Disruption"@en ; - skos:prefLabel "Organisation Disruption"@en . + skos:definition "Risks and issues that arise during operational processes"@en ; + skos:prefLabel "Operational Security Risk"@en . risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Personal Safety Endangerment"@en ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . -risk-owl:PersonnelAbsence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Personnel Absence"@en ; - skos:prefLabel "Personnel Absence"@en . - risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Physical Assault"@en ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . -risk-owl:PhysicalSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Spying"@en ; - skos:prefLabel "Physical Spying"@en . - -risk-owl:PhysicalStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Stalking"@en ; - skos:prefLabel "Physical Stalking"@en . - -risk-owl:PreventExercisingOfRights a rdfs:Class, +risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Prevent Exercising of Rights"@en ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk-owl:PrivacyImpact a rdfs:Class, +risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Privacy impact"@en ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Psychological Harm"@en ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Public Order Breach"@en ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . -risk-owl:RansomwareAttack a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:prefLabel "Ransomware Attack"@en . - risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Re-identification"@en ; - skos:prefLabel "Re-identification"@en . - -risk-owl:RemoteSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Remote Spying"@en ; - skos:prefLabel "Remote Spying"@en . + skos:definition "Something that acts as or causes Re-identification"@en ; + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:prefLabel "Remuneration"@en . -risk-owl:ReplacementCosts a rdfs:Class, +risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Replacement Costs"@en ; - skos:prefLabel "Replacement Costs"@en . + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; + skos:prefLabel "Reputational Risk"@en . -risk-owl:ReputationTrustImpact a rdfs:Class, +risk-owl:Reward a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Reputation and trust impact"@en ; - skos:prefLabel "Reputation and trust impact"@en . + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; + skos:prefLabel "Reward"@en . -risk-owl:RetrievalDeletedData a rdfs:Class, +risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Deleted Data"@en ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk-owl:RetrievalDiscardedEquipment a rdfs:Class, +risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:Impact, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Discarded Equipment"@en ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk-owl:Reward a rdfs:Class, +risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Reward provided as compensation (as an impact)"@en ; - skos:prefLabel "Reward"@en . + skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + +risk-owl:RightsViolation a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Sabotage"@en ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Scam"@en ; + skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . -risk-owl:SecurityBreach a rdfs:Class, +risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Security Breach"@en ; - skos:prefLabel "Security Breach"@en . + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:prefLabel "Security Attack"@en . -risk-owl:ServiceInterruption a rdfs:Class, +risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Service Interruption"@en ; - skos:prefLabel "Service Interruption"@en . + skos:definition "Something that acts as or causes Security Breach"@en ; + skos:prefLabel "Security Breach"@en . risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Sexual Violence"@en ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Social Disadvantage"@en ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . -risk-owl:Spam a rdfs:Class, +risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Spam"@en ; - skos:prefLabel "Spam"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk-owl:Spoofing a rdfs:Class, +risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Spoofing"@en ; - skos:prefLabel "Spoofing"@en . + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:prefLabel "Societal Risk"@en . -risk-owl:Spying a rdfs:Class, +risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Spying"@en ; - skos:prefLabel "Spying"@en . - -risk-owl:Stalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Stalking"@en ; - skos:prefLabel "Stalking"@en . + skos:definition "Something that acts as or causes Spoofing"@en ; + skos:prefLabel "Spoofing"@en . risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Failure"@en ; - skos:prefLabel "System Failure"@en . + skos:definition "Something that acts as or causes System Failure"@en ; + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "System Intrusion"@en ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Malfunction"@en ; - skos:prefLabel "System Malfunction"@en . + skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Terrorism"@en ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:prefLabel "Terrorism"@en . -risk-owl:Theft a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft"@en ; - skos:prefLabel "Theft"@en . - -risk-owl:TheftEquipment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Equipment"@en ; - skos:prefLabel "Theft of Equipment"@en . - -risk-owl:TheftMedia a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Media"@en ; - skos:prefLabel "Theft of Media"@en . - -risk-owl:ThirdPartyOperationDisruption a rdfs:Class, +risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Third Party Operation Disruption"@en ; - skos:prefLabel "Third Party Operation Disruption"@en . + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:prefLabel "Unauthorised Access to Premises"@en . -risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, +risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Access to Premises"@en ; - skos:prefLabel "Unauthorised Access to Premises"@en . + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . -risk-owl:UnauthorisedImpersonation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Unauthorised Impersonation"@en ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Reidentification ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Resource Use"@en ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Access"@en ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . -risk-owl:UnknownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Code Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Data Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk-owl:Vandalism a rdfs:Class, +risk-owl:UserRisks a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; + skos:prefLabel "User Risks"@en . + +risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Vandalism"@en ; - skos:prefLabel "Vandalism"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk-owl:ViolationCodeConduct a rdfs:Class, +risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Code of Conduct"@en ; - skos:prefLabel "Violation of Code of Conduct"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk-owl:ViolationContractualObligations a rdfs:Class, +risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk-owl:ViolationEthicalCode a rdfs:Class, +risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Ethical Code"@en ; - skos:prefLabel "Violation of Ethical Code"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . -risk-owl:ViolationOfRights a rdfs:Class, +risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Rights"@en ; - skos:prefLabel "Violation of Rights"@en . + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:prefLabel "Violating Policy"@en . -risk-owl:ViolationRegulatoryObligations a rdfs:Class, +risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Regulatory Obligations"@en ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk-owl:ViolationStatutoryObligations a rdfs:Class, +risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:definition "Something that acts as or causes Child Violence"@en ; + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk-owl:VulnerabilityCreated a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:InternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Vulnerability Created"@en ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:prefLabel "Vulnerability Created"@en . -risk-owl:VulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Vulnerability Exploited"@en ; - skos:prefLabel "Vulnerability Exploited"@en . - risk-owl:serialisation-html a profile:ResourceDescriptor ; dct:conformsTo ; dct:format ; diff --git a/2.1-dev/risk/modules/risk_consequences.csv b/2.1-dev/risk/modules/risk_consequences.csv index 4fe288776..f928036db 100644 --- a/2.1-dev/risk/modules/risk_consequences.csv +++ b/2.1-dev/risk/modules/risk_consequences.csv @@ -1,167 +1,114 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -AbusiveContentUtilisation,class,https://w3id.org/dpv/risk#AbusiveContentUtilisation,Abusive Content Utilisation,Abusive Content Utilisation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -AttackonPrivateLife,class,https://w3id.org/dpv/risk#AttackonPrivateLife,Attack on Private Life,Attack on Private Life,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Authorisation Failure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Impact(s) that acts as or causes benefits,https://w3id.org/dpv#Impact,,https://w3id.org/dpv#Impact,,2022-03-23,,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Blackmail,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Brute Force Authorisations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -BusinessImpact,class,https://w3id.org/dpv/risk#BusinessImpact,Business impact,Business impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -BusinessPerformanceImpairment,class,https://w3id.org/dpv/risk#BusinessPerformanceImpairment,Business Performance Impairment,Business Performance Impairment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Businessdisruption,class,https://w3id.org/dpv/risk#Businessdisruption,Business disruption,Business disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ChildViolence,class,https://w3id.org/dpv/risk#ChildViolence,Child Violence,Child Violence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -CitizensImpact,class,https://w3id.org/dpv/risk#CitizensImpact,Citizens impact,Citizens impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Coercion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Compensation provided (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Benefit,,2024-04-14,,risk,https://w3id.org/dpv/risk -ComplianceImpact,class,https://w3id.org/dpv/risk#ComplianceImpact,Compliance impact,Compliance impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Compromise Account,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Compromise Account Credentials,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -CompromiseAccountSecurity,class,https://w3id.org/dpv/risk#CompromiseAccountSecurity,Compromise Account Security,Compromise Account Security,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Confidentiality Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ConsequenceForDataSubject,class,https://w3id.org/dpv/risk#ConsequenceForDataSubject,Consequence for Data Subject,Consequence for Data Subject,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-10-22,,risk,https://w3id.org/dpv/risk -ConsequenceOnDataSecurity,class,https://w3id.org/dpv/risk#ConsequenceOnDataSecurity,Consequence on Data Security,Consequence on Data Security,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-10-22,,risk,https://w3id.org/dpv/risk -CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Copyright Violation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -CorruptionData,class,https://w3id.org/dpv/risk#CorruptionData,Corruption of Data,Corruption of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostAcquisition,class,https://w3id.org/dpv/risk#CostAcquisition,Cost of Acquisition,Cost of Acquisition,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostBackup,class,https://w3id.org/dpv/risk#CostBackup,Cost of Backup,Cost of Backup,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostConfiguration,class,https://w3id.org/dpv/risk#CostConfiguration,Cost of Configuration,Cost of Configuration,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostInstallation,class,https://w3id.org/dpv/risk#CostInstallation,Cost of Installation,Cost of Installation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostJudicialPenalties,class,https://w3id.org/dpv/risk#CostJudicialPenalties,Cost of Judicial Penalties,Cost of Judicial Penalties,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostJudicialProceedings,class,https://w3id.org/dpv/risk#CostJudicialProceedings,Cost of Judicial Proceedings,Cost of Judicial Proceedings,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostOperationInterruption,class,https://w3id.org/dpv/risk#CostOperationInterruption,Cost of Operation Interruption,Cost of Operation Interruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostSuspendedOperations,class,https://w3id.org/dpv/risk#CostSuspendedOperations,Cost of Suspended Operations,Cost of Suspended Operations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CyberSpying,class,https://w3id.org/dpv/risk#CyberSpying,Cyber Spying,Cyber Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -CyberStalking,class,https://w3id.org/dpv/risk#CyberStalking,Cyber Stalking,Cyber Stalking,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Impact that acts as or causes damages,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-03-30,,risk,https://w3id.org/dpv/risk -DamageByThirdParty,class,https://w3id.org/dpv/risk#DamageByThirdParty,Damage by Third Party,Damage by Third Party,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -DangertoCustomers,class,https://w3id.org/dpv/risk#DangertoCustomers,Danger to Customers,Danger to Customers,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -DangertoPersonnel,class,https://w3id.org/dpv/risk#DangertoPersonnel,Danger to Personnel,Danger to Personnel,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Data Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Denial of Service Attack (DoS),https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Impact that acts as or causes detriments,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-03-23,,risk,https://w3id.org/dpv/risk -DetrimentToRecovery,class,https://w3id.org/dpv/risk#DetrimentToRecovery,Detriment to Recovery,Detriment to Recovery,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Discrimination,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-19,,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Eavesdropping,class,https://w3id.org/dpv/risk#Eavesdropping,Eavesdropping,Eavesdropping,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -EconomicDisadvantage,class,https://w3id.org/dpv/risk#EconomicDisadvantage,Economic Disadvantage,Economic Disadvantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-19,,risk,https://w3id.org/dpv/risk -EnvironmentalSafetyEndangerment,class,https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment,Environmental Safety Endangerment,Environmental Safety Endangerment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Equipment Failure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Equipment Malfunction,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Erroneous System Use,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Extorsion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Fee provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -FinancialEquipmentCosts,class,https://w3id.org/dpv/risk#FinancialEquipmentCosts,Financial Equipment Costs,Financial Equipment Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialInvestigationCosts,class,https://w3id.org/dpv/risk#FinancialInvestigationCosts,Financial Investigation Costs,Financial Investigation Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Financial Loss,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialPersonnelCosts,class,https://w3id.org/dpv/risk#FinancialPersonnelCosts,Financial Personnel Costs,Financial Personnel Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialRepairCosts,class,https://w3id.org/dpv/risk#FinancialRepairCosts,Financial Repair Costs,Financial Repair Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Fraud,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -GovernmentCrisis,class,https://w3id.org/dpv/risk#GovernmentCrisis,Government Crisis,Government Crisis,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Impact that acts as or causes harms,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-13,,risk,https://w3id.org/dpv/risk -HarmfulSpeech,class,https://w3id.org/dpv/risk#HarmfulSpeech,Harmful Speech,Harmful Speech,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -HealthLifeImpact,class,https://w3id.org/dpv/risk#HealthLifeImpact,Health and life impact,Health and life impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Human Errors,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -IdentityDispute,class,https://w3id.org/dpv/risk#IdentityDispute,Identity Dispute,Identity Dispute,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-24,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Identity Fraud,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Identity Theft,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -IllegalProcessingData,class,https://w3id.org/dpv/risk#IllegalProcessingData,Illegal Processing of Data,Illegal Processing of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ImpactOnDataSubject,class,https://w3id.org/dpv/risk#ImpactOnDataSubject,Impact on Data Subject,Impact on Data Subject,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-10-22,,risk,https://w3id.org/dpv/risk -ImpactToRights,class,https://w3id.org/dpv/risk#ImpactToRights,Impact to Rights,Impact to Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -IncreaseInternalCost,class,https://w3id.org/dpv/risk#IncreaseInternalCost,Increase Internal Cost,Increase Internal Cost,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -IndustrialCrisis,class,https://w3id.org/dpv/risk#IndustrialCrisis,Industrial Crisis,Industrial Crisis,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Injury,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -InterceptionCommunications,class,https://w3id.org/dpv/risk#InterceptionCommunications,Interception of Communications,Interception of Communications,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -InternalOperationDisruption,class,https://w3id.org/dpv/risk#InternalOperationDisruption,Internal Operation Disruption,Internal Operation Disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -KnownVulnerabilityExploited,class,https://w3id.org/dpv/risk#KnownVulnerabilityExploited,Known Vulnerability Exploited,Known Vulnerability Exploited,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LawEnforcementAdverseEffects,class,https://w3id.org/dpv/risk#LawEnforcementAdverseEffects,Law Enforcement Adverse Effects,Law Enforcement Adverse Effects,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LimitationOfRights,class,https://w3id.org/dpv/risk#LimitationOfRights,Limitation of Rights,Limitation of Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-18,,risk,https://w3id.org/dpv/risk -LossAssets,class,https://w3id.org/dpv/risk#LossAssets,Loss of Assets,Loss of Assets,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossCompetitiveAdvantage,class,https://w3id.org/dpv/risk#LossCompetitiveAdvantage,Loss of Competitive Advantage,Loss of Competitive Advantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossControlOverData,class,https://w3id.org/dpv/risk#LossControlOverData,Loss of Control over Data,Loss of Control over Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-19,,risk,https://w3id.org/dpv/risk -LossCredibility,class,https://w3id.org/dpv/risk#LossCredibility,Loss of Credibility,Loss of Credibility,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossCustomerConfidence,class,https://w3id.org/dpv/risk#LossCustomerConfidence,Loss of Customer Confidence,Loss of Customer Confidence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossCustomers,class,https://w3id.org/dpv/risk#LossCustomers,Loss of Customers,Loss of Customers,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossData,class,https://w3id.org/dpv/risk#LossData,Loss of Data,Loss of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossFunds,class,https://w3id.org/dpv/risk#LossFunds,Loss of Funds,Loss of Funds,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossGoods,class,https://w3id.org/dpv/risk#LossGoods,Loss of Goods,Loss of Goods,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossGoodwill,class,https://w3id.org/dpv/risk#LossGoodwill,Loss of Goodwill,Loss of Goodwill,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossNegotiatingCapacity,class,https://w3id.org/dpv/risk#LossNegotiatingCapacity,Loss of Negotiating Capacity,Loss of Negotiating Capacity,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossOpportunity,class,https://w3id.org/dpv/risk#LossOpportunity,Loss of Opportunity,Loss of Opportunity,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossProprietaryInformation,class,https://w3id.org/dpv/risk#LossProprietaryInformation,Loss of Proprietary Information,Loss of Proprietary Information,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossReputation,class,https://w3id.org/dpv/risk#LossReputation,Loss of Reputation,Loss of Reputation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossResources,class,https://w3id.org/dpv/risk#LossResources,Loss of Resources,Loss of Resources,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossSuppliers,class,https://w3id.org/dpv/risk#LossSuppliers,Loss of Suppliers,Loss of Suppliers,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossTechnologicalAdvantage,class,https://w3id.org/dpv/risk#LossTechnologicalAdvantage,Loss of Technological Advantage,Loss of Technological Advantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossTrust,class,https://w3id.org/dpv/risk#LossTrust,Loss of Trust,Loss of Trust,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Intentional use of software by including or inserting in a system for a harmful purpose,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,"Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system",https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Impact that acts as or causes material damages,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-03-30,,risk,https://w3id.org/dpv/risk -MisinformationDisinformation,class,https://w3id.org/dpv/risk#MisinformationDisinformation,Misinformation and Disinformation,"Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)",https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Misuse,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2024-06-11,,risk,https://w3id.org/dpv/risk -MisuseBreachedInformation,class,https://w3id.org/dpv/risk#MisuseBreachedInformation,Misuse of Breached Information,Misuse of Breached Information,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Impact that acts as or causes non-material damages,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-03-30,,risk,https://w3id.org/dpv/risk -OrganisationDisruption,class,https://w3id.org/dpv/risk#OrganisationDisruption,Organisation Disruption,Organisation Disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Payment provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Personal Safety Endangerment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PersonnelAbsence,class,https://w3id.org/dpv/risk#PersonnelAbsence,Personnel Absence,Personnel Absence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,A type of social engineering attack involving deceptive messages intended to reveal sensitive information,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Physical Assault,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhysicalSpying,class,https://w3id.org/dpv/risk#PhysicalSpying,Physical Spying,Physical Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhysicalStalking,class,https://w3id.org/dpv/risk#PhysicalStalking,Physical Stalking,Physical Stalking,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -PreventExercisingOfRights,class,https://w3id.org/dpv/risk#PreventExercisingOfRights,Prevent Exercising of Rights,Prevent Exercising of Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-18,,risk,https://w3id.org/dpv/risk -PrivacyImpact,class,https://w3id.org/dpv/risk#PrivacyImpact,Privacy impact,Privacy impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Psychological Harm,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Public Order Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -RansomwareAttack,class,https://w3id.org/dpv/risk#RansomwareAttack,Ransomware Attack,Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Re-identification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-19,,risk,https://w3id.org/dpv/risk -RemoteSpying,class,https://w3id.org/dpv/risk#RemoteSpying,Remote Spying,Remote Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Renumeration provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -ReplacementCosts,class,https://w3id.org/dpv/risk#ReplacementCosts,Replacement Costs,Replacement Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ReputationTrustImpact,class,https://w3id.org/dpv/risk#ReputationTrustImpact,Reputation and trust impact,Reputation and trust impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -RetrievalDeletedData,class,https://w3id.org/dpv/risk#RetrievalDeletedData,Retrieval of Deleted Data,Retrieval of Deleted Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -RetrievalDiscardedEquipment,class,https://w3id.org/dpv/risk#RetrievalDiscardedEquipment,Retrieval of Discarded Equipment,Retrieval of Discarded Equipment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Reward provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Sabotage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Scam,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Security Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -ServiceInterruption,class,https://w3id.org/dpv/risk#ServiceInterruption,Service Interruption,Service Interruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Sexual Violence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Social Disadvantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-19,,risk,https://w3id.org/dpv/risk -Spam,class,https://w3id.org/dpv/risk#Spam,Spam,Spam,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Spoofing,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Spying,class,https://w3id.org/dpv/risk#Spying,Spying,Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Stalking,class,https://w3id.org/dpv/risk#Stalking,Stalking,Stalking,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,System Failure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,System Intrusion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,System Malfunction,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Terrorism,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Theft,class,https://w3id.org/dpv/risk#Theft,Theft,Theft,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -TheftEquipment,class,https://w3id.org/dpv/risk#TheftEquipment,Theft of Equipment,Theft of Equipment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -TheftMedia,class,https://w3id.org/dpv/risk#TheftMedia,Theft of Media,Theft of Media,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ThirdPartyOperationDisruption,class,https://w3id.org/dpv/risk#ThirdPartyOperationDisruption,Third Party Operation Disruption,Third Party Operation Disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Unauthorised Access to Premises,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Unauthorised Code Access,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Unauthorised Code Disclosure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Unauthorised Code Modification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Unauthorised Data Access,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Unauthorised Data Disclosure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Unauthorised Data Modification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedImpersonation,class,https://w3id.org/dpv/risk#UnauthorisedImpersonation,Unauthorised Impersonation,Unauthorised Impersonation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Unauthorised Information Disclosure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Unauthorised Re-Identification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Reidentification,,2022-08-19,,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Unauthorised Resource Use,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Unauthorised System Access,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Unauthorised System Modification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnknownVulnerabilityExploited,class,https://w3id.org/dpv/risk#UnknownVulnerabilityExploited,Unknown Vulnerability Exploited,Unknown Vulnerability Exploited,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Unwanted Code Deletion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Unwanted Data Deletion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Unwanted Disclosure of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Vandalism,class,https://w3id.org/dpv/risk#Vandalism,Vandalism,Vandalism,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationCodeConduct,class,https://w3id.org/dpv/risk#ViolationCodeConduct,Violation of Code of Conduct,Violation of Code of Conduct,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationContractualObligations,class,https://w3id.org/dpv/risk#ViolationContractualObligations,Violation of Contractual Obligations,Violation of Contractual Obligations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationEthicalCode,class,https://w3id.org/dpv/risk#ViolationEthicalCode,Violation of Ethical Code,Violation of Ethical Code,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationOfRights,class,https://w3id.org/dpv/risk#ViolationOfRights,Violation of Rights,Violation of Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-18,,risk,https://w3id.org/dpv/risk -ViolationRegulatoryObligations,class,https://w3id.org/dpv/risk#ViolationRegulatoryObligations,Violation of Regulatory Obligations,Violation of Regulatory Obligations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationStatutoryObligations,class,https://w3id.org/dpv/risk#ViolationStatutoryObligations,Violation of Statutory Obligations,Violation of Statutory Obligations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Vulnerability Created,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -VulnerabilityExploited,class,https://w3id.org/dpv/risk#VulnerabilityExploited,Vulnerability Exploited,Vulnerability Exploited,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk +HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk +Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk +JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk +LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk +NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk +SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk +ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_consequences.jsonld b/2.1-dev/risk/modules/risk_consequences.jsonld index 78ac63941..cae886467 100644 --- a/2.1-dev/risk/modules/risk_consequences.jsonld +++ b/2.1-dev/risk/modules/risk_consequences.jsonld @@ -1,10 +1,10 @@ [ { - "@id": "https://w3id.org/dpv/risk#IdentityDispute", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14,7 +14,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-24" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Neb960f38438d48258bee0ebae96be48e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -30,13 +41,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -47,32 +58,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#DetrimentToRecovery", + "@id": "_:Neb960f38438d48258bee0ebae96be48e", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Threat Landscape 2021" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:Ne6d29cc562794702b681b9554016eecb" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -87,49 +98,21 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Detriment to Recovery" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Detriment to Recovery" - } - ] - }, - { - "@id": "_:Ne6d29cc562794702b681b9554016eecb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -142,9 +125,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50" + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -160,13 +149,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -177,42 +166,53 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50", + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossControlOverData", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N83bd5296b4d94804a73f0e0518c39495" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -228,13 +228,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Control over Data" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -245,27 +245,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Control over Data" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "_:N83bd5296b4d94804a73f0e0518c39495", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UserRisks", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -280,13 +291,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact(s) that acts as or causes benefits" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -297,16 +308,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossOpportunity", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -319,9 +330,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577" + "@id": "_:N540e39aa17014568ba5a2b03534c1f19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -337,13 +354,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Opportunity" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -354,32 +371,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Opportunity" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577", + "@id": "_:N540e39aa17014568ba5a2b03534c1f19", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonnelAbsence", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -392,9 +409,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde" + "@id": "_:N804ad242900c474395dd117c74dace8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -410,13 +433,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -427,63 +450,67 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde", + "@id": "_:N804ad242900c474395dd117c74dace8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactToRights", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -496,9 +523,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab" + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -514,13 +547,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -531,12 +564,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab", + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", "@type": [ "https://schema.org/WebPage" ], @@ -552,11 +585,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -569,9 +602,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115" + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -582,18 +621,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Environmental Safety Endangerment" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -604,12 +643,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Safety Endangerment" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115", + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", "@type": [ "https://schema.org/WebPage" ], @@ -625,27 +670,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LossReputation", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na656b20429c445f88a1845779a6748c4" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -660,13 +689,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Reputation" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -677,47 +700,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Reputation" - } - ] - }, - { - "@id": "_:Na656b20429c445f88a1845779a6748c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -733,13 +741,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -750,32 +758,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Compensation" } ] }, { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#AbusiveContentUtilisation", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -788,9 +811,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd" + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -801,18 +830,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Abusive Content Utilisation" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -823,32 +852,69 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Abusive Content Utilisation" + "@value": "Violating Ethics Code" } - ] - }, + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + } + ] + }, { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd", + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#HarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -861,9 +927,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940" + "@id": "_:Na66b6d002d3f448981a58870da1a686e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -879,13 +951,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harmful Speech" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -896,32 +968,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harmful Speech" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940", + "@id": "_:Na66b6d002d3f448981a58870da1a686e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossSuppliers", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -931,12 +1003,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -952,13 +1025,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Suppliers" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -969,32 +1042,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Suppliers" - } - ] - }, - { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedImpersonation", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1007,9 +1070,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4" + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1025,13 +1094,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1042,12 +1111,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "Injury" } ] }, { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4", + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", "@type": [ "https://schema.org/WebPage" ], @@ -1063,26 +1132,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Na7ae462a47ff4a078544c1576af327df" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1098,13 +1168,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1115,47 +1185,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ] - }, - { - "@id": "_:Na7ae462a47ff4a078544c1576af327df", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1171,13 +1226,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1188,32 +1243,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" - } - ] - }, - { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1226,9 +1265,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db" + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1244,13 +1289,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1261,32 +1306,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Human Errors" } ] }, { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db", + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoteSpying", + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1299,9 +1344,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N76f8e9999d454353951813283e46b250" + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1317,13 +1368,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Remote Spying" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1334,12 +1385,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remote Spying" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N76f8e9999d454353951813283e46b250", + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", "@type": [ "https://schema.org/WebPage" ], @@ -1355,11 +1406,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#BusinessPerformanceImpairment", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1372,9 +1423,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N42235d0a675a4bf393d379a4650a468b" + "@id": "_:N0d138f94265e46f293490fbe0fc8074c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1390,13 +1447,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1407,12 +1464,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:N42235d0a675a4bf393d379a4650a468b", + "@id": "_:N0d138f94265e46f293490fbe0fc8074c", "@type": [ "https://schema.org/WebPage" ], @@ -1428,11 +1485,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1442,7 +1499,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7f1dc230141c4448a99f28f362191020" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1458,13 +1526,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1475,16 +1543,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" + } + ] + }, + { + "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CitizensImpact", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1497,9 +1587,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68" + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1515,13 +1611,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1532,32 +1628,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68", + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1570,9 +1666,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N787d49d55a21419a871a50a966b25089" + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1588,13 +1690,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Injury" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1605,12 +1707,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N787d49d55a21419a871a50a966b25089", + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", "@type": [ "https://schema.org/WebPage" ], @@ -1626,11 +1728,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LossTechnologicalAdvantage", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1643,9 +1745,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac" + "@id": "_:N61513676426149faae9e58063eb667d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1661,13 +1769,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Technological Advantage" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1678,47 +1786,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Technological Advantage" + "@value": "Coercion" } ] }, { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac", + "@id": "_:N61513676426149faae9e58063eb667d8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#TheftMedia", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1734,13 +1843,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1751,32 +1860,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Media" - } - ] - }, - { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostOperationInterruption", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1789,9 +1888,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f" + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1807,13 +1912,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1824,47 +1929,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f", + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1880,13 +1992,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1897,32 +2009,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Limitation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#BusinessImpact", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1935,9 +2037,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9088c785a56f4f7fa048660465c7540e" + "@id": "_:N842f6dd3b92c482180f56ce6a495c382" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1953,13 +2061,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business impact" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1970,32 +2078,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business impact" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N9088c785a56f4f7fa048660465c7540e", + "@id": "_:N842f6dd3b92c482180f56ce6a495c382", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2008,9 +2116,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf" + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2026,13 +2140,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2043,12 +2157,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf", + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", "@type": [ "https://schema.org/WebPage" ], @@ -2064,27 +2178,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ThirdPartyOperationDisruption", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N213543eccf8b457d9b7afa4825722eef" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2099,13 +2197,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Third Party Operation Disruption" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2116,42 +2214,37 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Third Party Operation Disruption" + "@value": "Judicial Penalty" } ] }, { - "@id": "_:N213543eccf8b457d9b7afa4825722eef", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConsequenceOnDataSecurity", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@id": "_:N4387faf4bb854435bfdc47ebf666782a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2167,13 +2260,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2184,16 +2277,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2206,9 +2315,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58" + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2224,13 +2339,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fraud" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2241,12 +2356,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Security Breach" } ] }, { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58", + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", "@type": [ "https://schema.org/WebPage" ], @@ -2262,11 +2377,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#CyberSpying", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2279,9 +2394,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f" + "@id": "_:Nbeddee22b7a841e39879764ab63949f8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2297,13 +2418,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cyber Spying" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2314,32 +2435,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cyber Spying" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f", + "@id": "_:Nbeddee22b7a841e39879764ab63949f8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2352,9 +2473,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b" + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2370,13 +2497,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "System Failure" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2387,32 +2514,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b", + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#CorruptionData", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2425,9 +2552,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae" + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2443,13 +2576,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Corruption of Data" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2460,12 +2593,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Corruption of Data" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae", + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", "@type": [ "https://schema.org/WebPage" ], @@ -2481,11 +2614,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2498,9 +2631,18 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c" + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" + }, + { + "@id": "_:N698cebdfba864777b23d25052c4d2493" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2516,13 +2658,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2533,84 +2678,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Spoofing" } ] }, { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c", + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#PreventExercisingOfRights", + "@id": "_:N698cebdfba864777b23d25052c4d2493", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Prevent Exercising of Rights" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#HealthLifeImpact", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2623,9 +2732,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5" + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2641,13 +2756,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Health and life impact" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2658,48 +2773,69 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Health and life impact" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5", + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ServiceInterruption", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2714,13 +2850,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Service Interruption" + "@value": "Concepts associated with security threats and issues that originate within the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2731,48 +2867,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Service Interruption" + "@value": "Internal Security Threat" } ] }, { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/turtle/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Stalking", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2787,13 +2953,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Stalking" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2804,32 +2970,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Stalking" - } - ] - }, - { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2842,9 +2992,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce" + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2860,13 +3016,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2877,32 +3033,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce", + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndustrialCrisis", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2915,9 +3077,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na943aaebcd6b4587862424ae0d880839" + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2933,13 +3101,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2950,48 +3118,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:Na943aaebcd6b4587862424ae0d880839", + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N625ea761ef2c46e49325339e76de3953" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3006,13 +3158,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3023,32 +3175,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" - } - ] - }, - { - "@id": "_:N625ea761ef2c46e49325339e76de3953", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3061,9 +3197,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790" + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3079,13 +3221,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3096,12 +3238,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Public Order Breach" } ] }, { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790", + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", "@type": [ "https://schema.org/WebPage" ], @@ -3117,11 +3259,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3131,12 +3273,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3152,13 +3295,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3169,32 +3312,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#MisinformationDisinformation", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3207,9 +3340,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c" + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3220,18 +3359,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3242,32 +3381,69 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misinformation and Disinformation" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c", + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Eavesdropping", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3280,9 +3456,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118" + "@id": "_:Nf877665a169e4a7eac29964fc15db245" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3298,13 +3480,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Eavesdropping" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3315,48 +3497,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Eavesdropping" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118", + "@id": "_:Nf877665a169e4a7eac29964fc15db245", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Theft", + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0987f80167844b359aae438673b4fe3b" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3371,13 +3537,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3388,32 +3554,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft" - } - ] - }, - { - "@id": "_:N0987f80167844b359aae438673b4fe3b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RansomwareAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3426,12 +3576,15 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ { - "@id": "_:N5e35e90757324413800afec9a109dbc4" + "@id": "_:N8193907d23bd43dc8b146573989b8a0d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3447,13 +3600,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3464,48 +3617,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ransomware Attack" - } - ] - }, - { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:N5e35e90757324413800afec9a109dbc4", + "@id": "_:N8193907d23bd43dc8b146573989b8a0d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3518,9 +3655,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2" + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3536,13 +3679,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3553,63 +3696,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2", + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#InternalOperationDisruption", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3622,9 +3740,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2" + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3640,13 +3764,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Internal Operation Disruption" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3657,12 +3781,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Operation Disruption" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2", + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", "@type": [ "https://schema.org/WebPage" ], @@ -3678,26 +3808,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LossResources", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N6f190351ee794fc7bea72163952a80c9" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3713,13 +3844,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Resources" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3730,32 +3861,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Resources" - } - ] - }, - { - "@id": "_:N6f190351ee794fc7bea72163952a80c9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossFunds", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3765,12 +3880,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N853be36f6ea645d181836e5c35b74b46" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3786,13 +3902,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Funds" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3803,32 +3919,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Funds" - } - ] - }, - { - "@id": "_:N853be36f6ea645d181836e5c35b74b46", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spam", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3838,12 +3944,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3859,13 +3966,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spam" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3876,48 +3983,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spam" - } - ] - }, - { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3932,13 +4007,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3949,32 +4024,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Security Attack" } ] }, { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3987,9 +4077,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3" + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4005,13 +4101,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4022,42 +4118,53 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Fraud" } ] }, { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3", + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LimitationOfRights", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4073,13 +4180,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4090,16 +4197,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "System Intrusion" + } + ] + }, + { + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#KnownVulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4112,9 +4235,18 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N929457e20b914d3ca2b32435a60cb142" + "@id": "_:N51a29309d655420e8611a50e7d2baa7c" + }, + { + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4130,13 +4262,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4147,49 +4279,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N929457e20b914d3ca2b32435a60cb142", + "@id": "_:N51a29309d655420e8611a50e7d2baa7c", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "DGA 2.10" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4204,13 +4335,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fee provided as compensation (as an impact)" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4221,16 +4352,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4243,9 +4374,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N471809172d6943bf838438296ceb4144" + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4261,13 +4398,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4278,32 +4415,92 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Malware Attack" } ] }, { - "@id": "_:N471809172d6943bf838438296ceb4144", + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4313,7 +4510,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4329,13 +4532,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes material damages" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4346,16 +4549,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4368,9 +4577,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f" + "@id": "_:N1802c2900f5b4c578896c91c3149381d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4381,18 +4596,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4403,32 +4618,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f", + "@id": "_:N1802c2900f5b4c578896c91c3149381d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4441,9 +4662,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N314876c286064f38bbd79769edaa4106" + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4459,13 +4686,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4476,63 +4703,67 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Extorsion" } ] }, { - "@id": "_:N314876c286064f38bbd79769edaa4106", + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Risk Concepts - N3 serialiation" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationCodeConduct", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4545,9 +4776,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752" + "@id": "_:N903ec696d7504183af4ba63f3f295e8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4563,13 +4800,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Code of Conduct" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4580,32 +4817,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Code of Conduct" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752", + "@id": "_:N903ec696d7504183af4ba63f3f295e8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalProcessingData", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4618,9 +4855,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578" + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4636,13 +4879,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Illegal Processing of Data" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4653,12 +4896,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Processing of Data" + "@value": "Physical Assault" } ] }, { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578", + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", "@type": [ "https://schema.org/WebPage" ], @@ -4674,11 +4917,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Vandalism", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4691,9 +4934,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N876c898e81374a399d04313b0a0abd5c" + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4709,13 +4958,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vandalism" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4726,32 +4975,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vandalism" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:N876c898e81374a399d04313b0a0abd5c", + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#DangertoCustomers", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4764,9 +5013,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N18831f0e8999465a8606d764cedbf772" + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4782,13 +5037,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Customers" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4799,12 +5057,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Customers" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:N18831f0e8999465a8606d764cedbf772", + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", "@type": [ "https://schema.org/WebPage" ], @@ -4820,42 +5084,11 @@ ] }, { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4868,9 +5101,23 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N834144a719d041d4970f5c070cc5f001" + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4886,13 +5133,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4903,47 +5150,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Data Breach" } ] }, { - "@id": "_:N834144a719d041d4970f5c070cc5f001", + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialRepairCosts", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4959,13 +5207,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Repair Costs" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4976,47 +5224,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Repair Costs" - } - ] - }, - { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Prevent Exercising of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCustomers", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5032,13 +5271,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Customers" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5049,32 +5288,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Customers" - } - ] - }, - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComplianceImpact", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5087,9 +5310,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9" + "@id": "_:N0282f3114f5b4278b632620b9b954c7d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5105,13 +5334,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compliance impact" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5122,32 +5351,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compliance impact" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9", + "@id": "_:N0282f3114f5b4278b632620b9b954c7d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5160,9 +5389,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad" + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5173,18 +5408,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5195,12 +5430,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad", + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", "@type": [ "https://schema.org/WebPage" ], @@ -5216,11 +5457,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationContractualObligations", + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5233,9 +5474,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N615266688f80421fb6568a1b19a929d0" + "@id": "_:N0296c48d481641d492572a05652b6bf5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5251,13 +5498,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Contractual Obligations" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5268,12 +5515,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligations" + "@value": "Financial Loss" } ] }, { - "@id": "_:N615266688f80421fb6568a1b19a929d0", + "@id": "_:N0296c48d481641d492572a05652b6bf5", "@type": [ "https://schema.org/WebPage" ], @@ -5289,22 +5536,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#IndividualRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5317,15 +5552,10 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes detriments" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5336,16 +5566,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5358,9 +5588,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb24249010a4a495187a77d855cd41e79" + "@id": "_:N3ef9f5a9eb554279905f69c263712205" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5376,13 +5612,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5393,32 +5629,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Blackmail" } ] }, { - "@id": "_:Nb24249010a4a495187a77d855cd41e79", + "@id": "_:N3ef9f5a9eb554279905f69c263712205", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossGoods", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5431,9 +5667,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N26efb77318794637980a0cf151019d5e" + "@id": "_:Nd8a232e440f041b496b97da8007b588a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5449,13 +5691,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Goods" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5466,12 +5708,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Goods" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N26efb77318794637980a0cf151019d5e", + "@id": "_:Nd8a232e440f041b496b97da8007b588a", "@type": [ "https://schema.org/WebPage" ], @@ -5487,4147 +5729,217 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationEthicalCode", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c" + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Julian Flake" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, { "@language": "en", - "@value": "Violation of Ethical Code" + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/identifier": [ { - "@language": "en", - "@value": "Violation of Ethical Code" + "@value": "https://w3id.org/dpv/risk" } - ] - }, - { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "2022-08-14" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/license": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.w3.org/copyright/document-license-2023/" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhishingScam", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "2024-07-13" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/publisher": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "accepted" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "A type of social engineering attack involving deceptive messages intended to reveal sensitive information" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "RISK" } - ] - }, - { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N30752965a65a41159a1711755717d53a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N30752965a65a41159a1711755717d53a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ChildViolence", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Child Violence" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Child Violence" - } - ] - }, - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RetrievalDiscardedEquipment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ] - }, - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostBackup", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Backup" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Backup" - } - ] - }, - { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Psychological Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ReplacementCosts", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4c9741bd041f4390a8836eff65dee208" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Replacement Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Replacement Costs" - } - ] - }, - { - "@id": "_:N4c9741bd041f4390a8836eff65dee208", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unwanted Code Deletion" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Payment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Compensation" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Payment provided as compensation (as an impact)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Payment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ] - }, - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#FinancialInvestigationCosts", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Financial Investigation Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Investigation Costs" - } - ] - }, - { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostSuspendedOperations", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Suspended Operations" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Suspended Operations" - } - ] - }, - { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Physical Assault" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AttackonPrivateLife", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N080033b8d0c44467ad532c1c7579376c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Attack on Private Life" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Attack on Private Life" - } - ] - }, - { - "@id": "_:N080033b8d0c44467ad532c1c7579376c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compromise Account Credentials" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#OrganisationDisruption", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Organisation Disruption" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Organisation Disruption" - } - ] - }, - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostConfiguration", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Configuration" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Configuration" - } - ] - }, - { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Sabotage", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Sabotage" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Spying", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Spying" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Spying" - } - ] - }, - { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountSecurity", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compromise Account Security" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Compromise Account Security" - } - ] - }, - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MisuseBreachedInformation", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Misuse of Breached Information" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Misuse of Breached Information" - } - ] - }, - { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Reidentification" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Re-Identification" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Re-Identification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostAcquisition", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Acquisition" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Acquisition" - } - ] - }, - { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolationOfRights", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Rights" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ImpactOnDataSubject", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact on Data Subject" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Impact on Data Subject" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LossGoodwill", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Goodwill" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Goodwill" - } - ] - }, - { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#GovernmentCrisis", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Government Crisis" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Government Crisis" - } - ] - }, - { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Terrorism", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Terrorism" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Terrorism" - } - ] - }, - { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CyberStalking", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cyber Stalking" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cyber Stalking" - } - ] - }, - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1b96d48534be4188984fec841d97a254" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Resource Use" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Resource Use" - } - ] - }, - { - "@id": "_:N1b96d48534be4188984fec841d97a254", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Harm", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes harms" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Harm" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolationRegulatoryObligations", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ] - }, - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ReputationTrustImpact", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Reputation and trust impact" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Reputation and trust impact" - } - ] - }, - { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Businessdisruption", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na71895376af947a9838430e3e01d3915" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Business disruption" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Business disruption" - } - ] - }, - { - "@id": "_:Na71895376af947a9838430e3e01d3915", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Reward", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Compensation" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Reward provided as compensation (as an impact)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Reward" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Misuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Delaram Golpayegani" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Misuse" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Misuse" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhysicalStalking", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Physical Stalking" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Stalking" - } - ] - }, - { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Financial Loss" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConsequenceForDataSubject", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Consequence for Data Subject" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Consequence for Data Subject" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LossProprietaryInformation", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N991585ef26bb47108970a62346663fd8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Proprietary Information" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Proprietary Information" - } - ] - }, - { - "@id": "_:N991585ef26bb47108970a62346663fd8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostInstallation", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Installation" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Installation" - } - ] - }, - { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk", - "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ - { - "@id": "https://www.w3.org/copyright/document-license-2023/" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, - { - "@id": "https://w3id.org/dpv" - } - ], - "http://xmlns.com/foaf/0.1/logo": [ - { - "@id": "https://w3id.org/dpv/media/logo.png" - } - ], - "https://schema.org/version": [ - { - "@value": "2.1-dev" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LossData", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Data" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Data" - } - ] - }, - { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LossAssets", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Assets" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Assets" - } - ] - }, - { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Intentional use of software by including or inserting in a system for a harmful purpose" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N796489c956df43e6941a9ff63835f450" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:N796489c956df43e6941a9ff63835f450", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DamageByThirdParty", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Damage by Third Party" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Damage by Third Party" - } - ] - }, - { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Social Disadvantage" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Social Disadvantage" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PrivacyImpact", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Privacy impact" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Privacy impact" - } - ] - }, - { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Intrusion" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhysicalSpying", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7757aee6b2134fec952a142a9d692e19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Physical Spying" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Spying" + "@value": "2.1-dev" } - ] - }, - { - "@id": "_:N7757aee6b2134fec952a142a9d692e19", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostJudicialProceedings", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "@id": "https://w3id.org/dpv/examples" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Cost of Judicial Proceedings" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@id": "http://www.w3.org/2004/02/skos/core#" + }, { - "@language": "en", - "@value": "Cost of Judicial Proceedings" + "@id": "https://w3id.org/dpv" } - ] - }, - { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "https://schema.org/url": [ + "https://schema.org/version": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptionCommunications", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9640,9 +5952,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb9fe3106440c4546b4b449106947b906" + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9658,13 +5976,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9675,12 +5993,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Nb9fe3106440c4546b4b449106947b906", + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", "@type": [ "https://schema.org/WebPage" ], @@ -9696,27 +6014,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#ComponentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9731,13 +6033,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9748,32 +6050,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Component Failure" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostJudicialPenalties", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9786,9 +6078,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34" + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9804,13 +6102,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Judicial Penalties" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9821,32 +6119,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Judicial Penalties" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34", + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnknownVulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9859,9 +6157,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d" + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9872,18 +6176,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unknown Vulnerability Exploited" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9894,63 +6198,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unknown Vulnerability Exploited" - } - ] - }, - { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Violation of Legal Obligations" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/guides" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LawEnforcementAdverseEffects", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9963,9 +6242,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019" + "@id": "_:N498890541a5449e290f0aea406ea5090" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9981,13 +6266,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Law Enforcement Adverse Effects" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9998,12 +6283,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Law Enforcement Adverse Effects" + "@value": "Scam" } ] }, { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019", + "@id": "_:N498890541a5449e290f0aea406ea5090", "@type": [ "https://schema.org/WebPage" ], @@ -10019,21 +6304,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10049,13 +6340,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes damages" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10066,16 +6357,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10088,9 +6379,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e" + "@id": "_:N12b2c9394da44250a5ab771adc23fab8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10106,13 +6403,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10123,12 +6420,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e", + "@id": "_:N12b2c9394da44250a5ab771adc23fab8", "@type": [ "https://schema.org/WebPage" ], @@ -10144,11 +6441,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10161,17 +6458,15 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@id": "_:N2039355de6a7474a8ab35355297e33c6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10187,13 +6482,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10204,32 +6499,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Phishing Scam" } ] }, { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2", + "@id": "_:N2039355de6a7474a8ab35355297e33c6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10242,6 +6537,12 @@ "@value": "2024-04-14" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10255,13 +6556,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Benefit" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compensation provided (as an impact)" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10272,26 +6573,37 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#EconomicDisadvantage", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10307,13 +6619,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10324,16 +6636,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" + } + ] + }, + { + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCompetitiveAdvantage", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10346,9 +6680,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4" + "@id": "_:Nbb93cef662444084828d04948d35895d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10364,13 +6704,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Competitive Advantage" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10381,12 +6721,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Competitive Advantage" + "@value": "Lose of Trust" } ] }, { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4", + "@id": "_:Nbb93cef662444084828d04948d35895d", "@type": [ "https://schema.org/WebPage" ], @@ -10402,11 +6742,52 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UserRisks" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Accidental Misuse" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Accidental Misuse" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10419,9 +6800,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140" + "@id": "_:Nad476399871e41a5bd37e1133df27770" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10437,13 +6824,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10454,32 +6841,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Identity Theft" } ] }, { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140", + "@id": "_:Nad476399871e41a5bd37e1133df27770", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncreaseInternalCost", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10492,9 +6879,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3" + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10510,13 +6903,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10527,47 +6920,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Sabotage" } ] }, { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3", + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RetrievalDeletedData", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10583,13 +6977,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Retrieval of Deleted Data" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10600,32 +6994,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Retrieval of Deleted Data" - } - ] - }, - { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialEquipmentCosts", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10638,9 +7016,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d" + "@id": "_:N9ba04625c759479eba79e0016163e8e6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10651,18 +7035,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10673,12 +7057,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d", + "@id": "_:N9ba04625c759479eba79e0016163e8e6", "@type": [ "https://schema.org/WebPage" ], @@ -10694,22 +7084,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10724,13 +7103,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Renumeration provided as compensation (as an impact)" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10741,16 +7120,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10763,9 +7142,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4b03b00cf447447bb996b08636f08431" + "@id": "_:N7beef942706b41468112e467b91c5f39" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10781,13 +7166,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10798,48 +7183,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:N4b03b00cf447447bb996b08636f08431", + "@id": "_:N7beef942706b41468112e467b91c5f39", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10854,13 +7223,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10871,38 +7240,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" - } - ] - }, - { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violating Policy" } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10915,9 +7262,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7" + "@id": "_:N347037135ba54cefae0a2a69a47e52d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10933,13 +7286,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10950,48 +7303,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7", + "@id": "_:N347037135ba54cefae0a2a69a47e52d9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11006,13 +7343,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Statutory Obligations" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11023,32 +7354,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ] - }, - { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11061,9 +7376,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2adacc609baf48e9b49883302a41f00c" + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11079,13 +7400,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11096,48 +7417,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Terrorism" } ] }, { - "@id": "_:N2adacc609baf48e9b49883302a41f00c", + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11152,13 +7457,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Coercion" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11169,47 +7474,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossTrust", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N581201da4fd547aea094261f8d92243c" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11225,13 +7515,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Trust" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11239,51 +7529,19 @@ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Trust" - } - ] - }, - { - "@id": "_:N581201da4fd547aea094261f8d92243c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DangertoPersonnel", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N6175971113014283a5d3202f299a2a09" + "@language": "en", + "@value": "Benefit" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11298,13 +7556,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Personnel" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11315,48 +7573,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Personnel" - } - ] - }, - { - "@id": "_:N6175971113014283a5d3202f299a2a09", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11371,13 +7597,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scam" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11388,42 +7614,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Component Malfunction" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11439,13 +7661,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes non-material damages" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11456,31 +7678,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N849c56349f884574b5accd799cf4b01d" + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11491,18 +7720,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Customer Confidence" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11513,43 +7742,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Customer Confidence" + "@value": "Fee" } ] }, { - "@id": "_:N849c56349f884574b5accd799cf4b01d", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Discrimination", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Georg P. Krog" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@language": "en", + "@value": "Concepts associated with security threats that are likely to originate externally" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "External Security Threat" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11564,13 +7807,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11581,16 +7824,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11603,9 +7846,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c" + "@id": "_:N73922ea12cd34584b91e209f306167ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11621,13 +7870,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11638,32 +7887,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Negotiating Capacity" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c", + "@id": "_:N73922ea12cd34584b91e209f306167ae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#TheftEquipment", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11676,9 +7925,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee206c8da189455dba93fd20501581cb" + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11694,13 +7949,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11711,63 +7966,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Compromise Account" } ] }, { - "@id": "_:Nee206c8da189455dba93fd20501581cb", + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.rdf" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCredibility", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11780,9 +8004,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d" + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11798,13 +8028,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11815,12 +8045,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d", + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", "@type": [ "https://schema.org/WebPage" ], @@ -11836,11 +8066,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11853,9 +8083,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe" + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11871,13 +8107,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Vulnerability Created" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11888,32 +8124,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Vulnerability Created" } ] }, { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe", + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11926,9 +8162,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503" + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11944,13 +8186,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11961,32 +8203,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503", + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialPersonnelCosts", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11999,9 +8241,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8" + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12017,13 +8265,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Personnel Costs" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12034,54 +8282,64 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Personnel Costs" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8", + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Activity" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Activity" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences.n3 b/2.1-dev/risk/modules/risk_consequences.n3 index cdf3bee92..b23e5df5b 100644 --- a/2.1-dev/risk/modules/risk_consequences.n3 +++ b/2.1-dev/risk/modules/risk_consequences.n3 @@ -15,2427 +15,1664 @@ @prefix vann: . @prefix xsd: . -risk:AbusiveContentUtilisation a rdfs:Class, +risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Abusive Content Utilisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Abusive Content Utilisation"@en . - -risk:AttackonPrivateLife a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Attack on Private Life"@en ; + skos:broader risk:UserRisks ; + skos:definition "Accidental Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Attack on Private Life"@en . + skos:prefLabel "Accidental Misuse"@en . risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Authorisation Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . +risk:AvailabilityBreach a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . + risk:Benefit a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes benefits"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Benefit"@en . risk:Blackmail a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Blackmail"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Brute Force Authorisations"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . -risk:BusinessImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Business impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business impact"@en . - -risk:BusinessPerformanceImpairment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business Performance Impairment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business Performance Impairment"@en . - -risk:Businessdisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business disruption"@en . - -risk:ChildViolence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Child Violence"@en . - -risk:CitizensImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Citizens impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Citizens impact"@en . - risk:Coercion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Coercion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . risk:Compensation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Benefit ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compensation"@en . -risk:ComplianceImpact a rdfs:Class, +risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Compliance impact"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compliance impact"@en . + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk:CompromiseAccount a rdfs:Class, +risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account"@en . + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk:CompromiseAccountCredentials a rdfs:Class, +risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account Credentials"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:prefLabel "Compromise Account"@en . -risk:CompromiseAccountSecurity a rdfs:Class, +risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Compromise Account Security"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Security"@en . + skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Confidentiality Breach"@en ; + skos:broader risk:DataBreach ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . -risk:ConsequenceForDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence for Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk:ConsequenceOnDataSecurity a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence on Data Security"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence on Data Security"@en . - risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Copyright Violation"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Copyright Violation"@en . -risk:CorruptionData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Corruption of Data"@en . - -risk:CostAcquisition a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Acquisition"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Acquisition"@en . - -risk:CostBackup a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Backup"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Backup"@en . - -risk:CostConfiguration a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Configuration"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Configuration"@en . - -risk:CostInstallation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Installation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Installation"@en . - -risk:CostJudicialPenalties a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk:CostJudicialProceedings a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk:CostOperationInterruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Operation Interruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk:CostSuspendedOperations a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Suspended Operations"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . -risk:CyberSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Spying"@en . - -risk:CyberStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Stalking"@en . - risk:Damage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Damage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Damage"@en . -risk:DamageByThirdParty a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Damage by Third Party"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Damage by Third Party"@en . - -risk:DangertoCustomers a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Customers"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Customers"@en . - -risk:DangertoPersonnel a rdfs:Class, +risk:DataBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex:E0069, + dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Personnel"@en ; + skos:broader risk:SecurityBreach ; + skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Personnel"@en . + skos:prefLabel "Data Breach"@en . -risk:DataBreach a rdfs:Class, +risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex:E0069, - dex:E0071 ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Data Breach"@en ; + sw:term_status "modified"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Data Breach"@en . + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk:Detriment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Detriment"@en . -risk:DetrimentToRecovery a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Detriment to Recovery"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Detriment to Recovery"@en . - risk:Discrimination a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Discrimination"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk:Eavesdropping a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Eavesdropping"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Eavesdropping"@en . - -risk:EconomicDisadvantage a rdfs:Class, +risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Economic Disadvantage"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Economic Disadvantage"@en . + skos:prefLabel "Environmental Risk"@en . -risk:EnvironmentalSafetyEndangerment a rdfs:Class, +risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Environmental Safety Endangerment"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:EquipmentFailure a rdfs:Class, +risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Equipment Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Failure"@en . + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:EquipmentMalfunction a rdfs:Class, +risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Equipment Malfunction"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Malfunction"@en . + skos:prefLabel "Erroneous System Use"@en . -risk:ErroneousSystemUse a rdfs:Class, +risk:ExposureToHarmfulSpeech a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Erroneous System Use"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Harmful Speech"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Erroneous System Use"@en . + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk:ExternalSecurityThreat a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "External Security Threat"@en . risk:Extorsion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Extorsion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . risk:Fee a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + sw:term_status "modified"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fee"@en . -risk:FinancialEquipmentCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Equipment Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk:FinancialInvestigationCosts a rdfs:Class, +risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Investigation Costs"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Financial Loss"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Financial Loss"@en . -risk:FinancialPersonnelCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Personnel Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk:FinancialRepairCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Repair Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Repair Costs"@en . - risk:Fraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Fraud"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . -risk:GovernmentCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Government Crisis"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Government Crisis"@en . - risk:Harm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes harms"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Harm to humans"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harm"@en . - -risk:HarmfulSpeech a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harmful Speech"@en . - -risk:HealthLifeImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Health and life impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Health and life impact"@en . + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Human Errors"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Human Errors"@en . -risk:IdentityDispute a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Identity Dispute"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Identity Dispute"@en . - risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Fraud"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Theft"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . -risk:IllegalProcessingData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Illegal Processing of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Illegal Processing of Data"@en . - -risk:ImpactOnDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact on Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact on Data Subject"@en . - -risk:ImpactToRights a rdfs:Class, +risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact to Rights"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact to Rights"@en . + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . -risk:IncreaseInternalCost a rdfs:Class, +risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Increase Internal Cost"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Increase Internal Cost"@en . + skos:prefLabel "Individual Health & Safety"@en . -risk:IndustrialCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk:IndividualRisk a rdfs:Class, + skos:Concept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Industrial Crisis"@en ; + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Industrial Crisis"@en . + skos:prefLabel "Individual Risk"@en . risk:Injury a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Injury"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Injury"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Injury"@en . -risk:InterceptionCommunications a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Interception of Communications"@en . - -risk:InternalOperationDisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Internal Operation Disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk:KnownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk:LawEnforcementAdverseEffects a rdfs:Class, +risk:IntegrityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . -risk:LimitationOfRights a rdfs:Class, +risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Limitation of Rights"@en ; + skos:broader risk:UserRisks ; + skos:definition "Intentional Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Limitation of Rights"@en . + skos:prefLabel "Intentional Misuse"@en . -risk:LossAssets a rdfs:Class, +risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Assets"@en ; + sw:term_status "modified"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Assets"@en . + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:LossCompetitiveAdvantage a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Competitive Advantage"@en . - -risk:LossControlOverData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Control over Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Control over Data"@en . - -risk:LossCredibility a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Credibility"@en . - -risk:LossCustomerConfidence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Customer Confidence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customer Confidence"@en . - -risk:LossCustomers a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Customers"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customers"@en . - -risk:LossData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Data"@en . - -risk:LossFunds a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk:InternalSecurityThreat a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Funds"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Funds"@en . + skos:prefLabel "Internal Security Threat"@en . -risk:LossGoods a rdfs:Class, +risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Goods"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goods"@en . + skos:prefLabel "Judicial Costs"@en . -risk:LossGoodwill a rdfs:Class, +risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Goodwill"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goodwill"@en . + skos:prefLabel "Judicial Penalty"@en . -risk:LossNegotiatingCapacity a rdfs:Class, +risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Negotiating Capacity"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:prefLabel "Legal Risk"@en . -risk:LossOpportunity a rdfs:Class, +risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Opportunity"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Credibility"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Opportunity"@en . + skos:prefLabel "Lose of Credibility"@en . -risk:LossProprietaryInformation a rdfs:Class, +risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Proprietary Information"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:prefLabel "Lose of Customer Confidence"@en . -risk:LossReputation a rdfs:Class, +risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Reputation"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Reputation"@en . + skos:prefLabel "Lose of Goodwill"@en . -risk:LossResources a rdfs:Class, +risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Resources"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Resources"@en . + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk:LossSuppliers a rdfs:Class, +risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Suppliers"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Suppliers"@en . + skos:prefLabel "Lose of Opportunity"@en . -risk:LossTechnologicalAdvantage a rdfs:Class, +risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Technological Advantage"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Reputation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:prefLabel "Lose of Reputation"@en . -risk:LossTrust a rdfs:Class, +risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Trust"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Trust"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Trust"@en . + skos:prefLabel "Lose of Trust"@en . risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Material Damage"@en . - -risk:MisinformationDisinformation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk:Misuse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Misuse"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Misuse"@en . -risk:MisuseBreachedInformation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Misuse of Breached Information"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misuse of Breached Information"@en . - risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes non-material damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Non-Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Non-Material Damage"@en . + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk:OrganisationDisruption a rdfs:Class, +risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Organisation Disruption"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Organisation Disruption"@en . + skos:prefLabel "Operational Security Risk"@en . risk:Payment a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Personal Safety Endangerment"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Personal Safety Endangerment"@en . -risk:PersonnelAbsence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Personnel Absence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Personnel Absence"@en . - risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Physical Assault"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Physical Assault"@en . -risk:PhysicalSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Spying"@en . - -risk:PhysicalStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Stalking"@en . - -risk:PreventExercisingOfRights a rdfs:Class, +risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Prevent Exercising of Rights"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk:PrivacyImpact a rdfs:Class, +risk:Privacy a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Privacy impact"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Psychological Harm"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Public Order Breach"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Public Order Breach"@en . -risk:RansomwareAttack a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Ransomware Attack"@en . - risk:Reidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Re-identification"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Re-identification"@en . + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . -risk:RemoteSpying a rdfs:Class, +risk:Renumeration a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Remote Spying"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Remote Spying"@en . + skos:prefLabel "Remuneration"@en . -risk:Renumeration a rdfs:Class, +risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:Impact ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Remuneration"@en . + skos:prefLabel "Reputational Risk"@en . -risk:ReplacementCosts a rdfs:Class, +risk:Reward a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Replacement Costs"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Replacement Costs"@en . + skos:prefLabel "Reward"@en . -risk:ReputationTrustImpact a rdfs:Class, +risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Reputation and trust impact"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reputation and trust impact"@en . + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk:RetrievalDeletedData a rdfs:Class, +risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Deleted Data"@en ; + skos:broader dpv:Impact, + risk:SocietalRisk ; + skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk:RetrievalDiscardedEquipment a rdfs:Class, +risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Discarded Equipment"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Limitation of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . -risk:Reward a rdfs:Class, +risk:RightsViolation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Reward provided as compensation (as an impact)"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Violation of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reward"@en . + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sabotage"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . risk:Scam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Scam"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . -risk:SecurityBreach a rdfs:Class, +risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Security Breach"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Security Breach"@en . + skos:prefLabel "Security Attack"@en . -risk:ServiceInterruption a rdfs:Class, +risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Service Interruption"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Service Interruption"@en . + skos:prefLabel "Security Breach"@en . risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sexual Violence"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sexual Violence"@en . risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Social Disadvantage"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Social Disadvantage"@en . -risk:Spam a rdfs:Class, +risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spam"@en ; + skos:broader risk:SocietalRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spam"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk:Spoofing a rdfs:Class, +risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spoofing"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spoofing"@en . + skos:prefLabel "Societal Risk"@en . -risk:Spying a rdfs:Class, +risk:Spoofing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spying"@en . - -risk:Stalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Stalking"@en ; + skos:broader risk:ExternalSecurityThreat, + risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Stalking"@en . + skos:prefLabel "Spoofing"@en . risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Failure"@en . + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Intrusion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Malfunction"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Malfunction"@en . + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Terrorism"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Terrorism"@en . -risk:Theft a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft"@en . - -risk:TheftEquipment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Equipment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Equipment"@en . - -risk:TheftMedia a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Media"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Media"@en . - -risk:ThirdPartyOperationDisruption a rdfs:Class, +risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Third Party Operation Disruption"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Third Party Operation Disruption"@en . + skos:prefLabel "Unauthorised Access to Premises"@en . -risk:UnauthorisedAccesstoPremises a rdfs:Class, +risk:UnauthorisedActivity a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Access to Premises"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unauthorised Access to Premises"@en . + skos:prefLabel "Unauthorised Activity"@en . risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised Code Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Data Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . -risk:UnauthorisedImpersonation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Impersonation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Reidentification ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Resource Use"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised System Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised System Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . -risk:UnknownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Code Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Data Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk:Vandalism a rdfs:Class, +risk:UserRisks a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "User Risks"@en . + +risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Vandalism"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vandalism"@en . + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk:ViolationCodeConduct a rdfs:Class, +risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Code of Conduct"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Code of Conduct"@en . + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk:ViolationContractualObligations a rdfs:Class, +risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Contractual Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Contractual Obligations"@en . + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk:ViolationEthicalCode a rdfs:Class, +risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Ethical Code"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Ethical Code"@en . + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . -risk:ViolationOfRights a rdfs:Class, +risk:ViolatingPolicy a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Violation of Rights"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Rights"@en . + skos:prefLabel "Violating Policy"@en . -risk:ViolationRegulatoryObligations a rdfs:Class, +risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Regulatory Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk:ViolationStatutoryObligations a rdfs:Class, +risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Statutory Obligations"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Child Violence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk:VulnerabilityCreated a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Created"@en ; + skos:broader risk:InternalSecurityThreat ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Vulnerability Created"@en . -risk:VulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Exploited"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/modules/risk_consequences.rdf b/2.1-dev/risk/modules/risk_consequences.rdf index 7b5510afb..4b756e8b0 100644 --- a/2.1-dev/risk/modules/risk_consequences.rdf +++ b/2.1-dev/risk/modules/risk_consequences.rdf @@ -12,3132 +12,2111 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Beatriz Esteves - Fajar Ekaputra - Julian Flake - Georg P. Krog - Delaram Golpayegani - Axel Polleres - Harshvardhan J. Pandit - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Loss of Customers - Loss of Customers - - + + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Technological Advantage - Loss of Technological Advantage - - + + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Identity Fraud - Identity Fraud - - - 2022-08-17 + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Consequence on Data Security - Consequence on Data Security - - 2022-10-22 + + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit, Georg P. Krog + Georg P. Krog - + - - Business impact - Business impact - - - 2022-08-17 + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - Harshvardhan J. Pandit - + - - Identity Theft - Identity Theft - - + + Lose of Reputation + Something that acts as or causes Loss of Reputation + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Unauthorised Resource Use - Unauthorised Resource Use - - + + Phishing Scam + Something that acts as or causes Phishing Scam + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Eavesdropping - Eavesdropping - - - 2022-08-17 + + Physical Harm + accepted - Harshvardhan J. Pandit - + - - Ransomware Attack - Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality - - - + + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Misuse of Breached Information - Misuse of Breached Information - - + + System Failure + Something that acts as or causes System Failure + + Here system refers to both hardware and software systems + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - HTML serialiation + + - - Cost of Judicial Penalties - Cost of Judicial Penalties - - + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Unauthorised Re-Identification - Unauthorised Re-Identification - - 2022-08-19 + + Sabotage + Something that acts as or causes Sabotage + + + 2022-08-17 + 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - - Interception of Communications - Interception of Communications - - + + Sexual Violence + Something that acts as or causes Sexual Violence + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Fraud - Fraud - - + + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Blackmail - Blackmail - - + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Cost of Judicial Proceedings - Cost of Judicial Proceedings - - + + Fraud + Something that acts as or causes Fraud + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Unwanted Data Deletion - Unwanted Data Deletion - - + + Data Breach + Something that acts as or causes Data Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit + + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Financial Personnel Costs - Financial Personnel Costs - - - 2022-08-17 + + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Identity Dispute - Identity Dispute - - 2022-08-24 + + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + accepted - Harshvardhan J. Pandit - + - - Fee - Fee provided as compensation (as an impact) - - DGA 2.10 - 2024-04-14 + + Detriment + Something that acts as or causes Detriment + + 2022-03-23 + 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - - - - - - Risk Concepts - RDF/XML serialiation + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + - - Industrial Crisis - Industrial Crisis - - + + Copyright Violation + Something that acts as or causes Copyright Violation + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Misuse - Misuse - - 2024-06-11 + + Societal Health & Safety + accepted - Delaram Golpayegani - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Law Enforcement Adverse Effects - Law Enforcement Adverse Effects - - + + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - - Physical Assault - Physical Assault - - + + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - - Cost of Configuration - Cost of Configuration - - + + Cryptojacking + Something that acts as or causes Cryptojacking + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Increase Internal Cost - Increase Internal Cost - - + + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - JSON-LD serialiation - - + - - Damage - Impact that acts as or causes damages - - 2022-03-30 + + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - Harshvardhan J. Pandit - + - - Violation of Regulatory Obligations - Violation of Regulatory Obligations - - - 2022-08-17 + + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Violation of Ethical Code - Violation of Ethical Code - - + + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Limitation of Rights - Limitation of Rights - - 2022-08-18 + + Component Malfunction + Something that acts as or causes Component Malfunction + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - - Cost of Acquisition - Cost of Acquisition - - + + Identity Fraud + Something that acts as or causes Identity Fraud + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - Primer for Data Privacy Vocabulary - - - - + - - Theft of Media - Theft of Media - - + + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Unauthorised Impersonation - Unauthorised Impersonation - - - 2022-08-17 + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Financial Repair Costs - Financial Repair Costs - - + + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Cryptojacking - Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency - - + + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - - - - - Material Damage - Impact that acts as or causes material damages - - 2022-03-30 - accepted - Harshvardhan J. Pandit - - + + + + + + + Risk Concepts - Turtle serialiation - + - - Service Interruption - Service Interruption - - + + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Cost of Backup - Cost of Backup - - - 2022-08-17 + + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - + - - Cost of Installation - Cost of Installation - - + + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - - Malicious Code Attack - Intentional use of software by including or inserting in a system for a harmful purpose - - + + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Financial Loss - Financial Loss - - - 2022-08-17 + + Re-identification + Something that acts as or causes Re-identification + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - Equipment Failure - Equipment Failure - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Unauthorised Code Disclosure - Unauthorised Code Disclosure - - + + Intercept Communications + Something that acts as or causes Interception of Communications + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - - Non-Material Damage - Impact that acts as or causes non-material damages - - 2022-03-30 + + Public Order Breach + Something that acts as or causes Public Order Breach + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Financial Equipment Costs - Financial Equipment Costs - - - 2022-08-17 + + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Spoofing - Spoofing - - + + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Suppliers - Loss of Suppliers - - + + Security Breach + Something that acts as or causes Security Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Unauthorised Data Modification - Unauthorised Data Modification - - + + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Loss of Assets - Loss of Assets - - + + Identity Theft + Something that acts as or causes Identity Theft + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Goods - Loss of Goods - - - 2022-08-17 + + Damage + Something that acts as or causes Damage + + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Compromise Account Credentials - Compromise Account Credentials - - + + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 + 2022-08-18 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + + + Equipment Failure + Something that acts as or causes Equipment Failure + + Here equipment refers to physical equipment + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - - - Risk Concepts - HTML serialiation - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Loss of Proprietary Information - Loss of Proprietary Information - - + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Resources - Loss of Resources - - - 2022-08-17 + + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Compromise Account Security - Compromise Account Security - - - 2022-08-17 + + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - - Theft - Theft - - + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Human Errors - Human Errors - - + + Erroneous System Use + Something that acts as or causes Erroneous System Use + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - Violation of Rights - Violation of Rights - - 2022-08-18 + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 + 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - Economic Disadvantage - Economic Disadvantage - - 2022-08-19 + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Georg P. Krog - + - - Sexual Violence - Sexual Violence - - + + Coercion + Something that acts as or causes Coercion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Harshvardhan J. Pandit + Georg P. Krog + Beatriz Esteves + Axel Polleres + Fajar Ekaputra + Delaram Golpayegani + Julian Flake + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + + + + + Guides for Data Privacy Vocabulary + + - + - - Third Party Operation Disruption - Third Party Operation Disruption - - + + Malware Attack + Something that acts as or causes Malware Attack + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + Examples for Data Privacy Vocabulary + + + + - - Known Vulnerability Exploited - Known Vulnerability Exploited - - - 2022-08-17 + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - Harshvardhan J. Pandit - + - - Unauthorised Data Disclosure - Unauthorised Data Disclosure - - + + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Copyright Violation - Copyright Violation - - - 2022-08-17 + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - - Violation of Contractual Obligations - Violation of Contractual Obligations - - + + Injury + Something that acts as or causes Injury + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - + - - Loss of Customer Confidence - Loss of Customer Confidence - - + + Authorisation Failure + Something that acts as or causes Authorisation Failure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Cyber Stalking - Cyber Stalking - - + + Lose of Trust + Something that acts as or causes Loss of Trust + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + Primer for Data Privacy Vocabulary + + + + - - Unauthorised Code Access - Unauthorised Code Access - - + + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Erroneous System Use - Erroneous System Use - - - 2022-08-17 + + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights + + This concept was called "PreventExercisingOfRights" in DPV 2.0 + 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Confidentiality Breach - Confidentiality Breach - - + + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - Environmental Safety Endangerment - Environmental Safety Endangerment - - - 2022-08-17 + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + User Risks + Concepts associated with risks that arise due to User or Human use + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - Guides for Data Privacy Vocabulary - - + + + + + Extorsion + Something that acts as or causes Extorsion + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + Benefit - Impact(s) that acts as or causes benefits - + Something that acts as or causes benefits + 2022-03-23 + 2024-08-16 accepted Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - - Business Performance Impairment - Business Performance Impairment - - + + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Public Order Breach - Public Order Breach - - + + Lose of Credibility + Something that acts as or causes Loss of Credibility + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Trust - Loss of Trust - - + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + - - Authorisation Failure - Authorisation Failure - - + + Spoofing + Something that acts as or causes Spoofing + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Data - Loss of Data - - + + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - - Remote Spying - Remote Spying - - + + Psychological Harm + Something that acts as or causes Psychological Harm + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Illegal Processing of Data - Illegal Processing of Data - - + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Unauthorised System Modification - Unauthorised System Modification - - + + Scam + Something that acts as or causes Scam + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Unauthorised Code Modification - Unauthorised Code Modification - - - 2022-08-17 + + Privacy + accepted - Harshvardhan J. Pandit - + - - Compensation - Compensation provided (as an impact) - - 2024-04-14 + + System Malfunction + Something that acts as or causes System Malfunction + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + + + + + + + Risk Concepts - JSON-LD serialiation + + - - Personal Safety Endangerment - Personal Safety Endangerment - - + + Vulnerability Created + Something that acts as or causes Vulnerability Created + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Psychological Harm - Psychological Harm - - + + Blackmail + Something that acts as or causes Blackmail + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Cyber Spying - Cyber Spying - - - 2022-08-17 + + accepted - Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + Risk Concepts - RDF/XML serialiation - + - - Internal Operation Disruption - Internal Operation Disruption - - + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Sabotage - Sabotage - - - 2022-08-17 + + accepted - Harshvardhan J. Pandit - + - - Unwanted Disclosure of Data - Unwanted Disclosure of Data - - + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + Here equipment refers to physical equipment + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Credibility - Loss of Credibility - - + + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Compromise Account - Compromise Account - - + + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Distributed Denial of Service Attack (DDoS) - Distributed Denial of Service Attack (DDoS) - - + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Detriment - Impact that acts as or causes detriments - - 2022-03-23 + + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + + + 2022-08-17 + 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Harshvardhan J. Pandit - + - - Coercion - Coercion - - + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Personnel Absence - Personnel Absence - - + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Harm - Impact that acts as or causes harms - - 2022-08-13 + + Discrimination + Something that acts as or causes Discrimination + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Data Breach - Data Breach - - - 2022-08-17 + + Individual Health & Safety + accepted - Harshvardhan J. Pandit - - - + - - Re-identification - Re-identification - - 2022-08-19 + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + + + + + Risk Concepts - N3 serialiation + + - - Unknown Vulnerability Exploited - Unknown Vulnerability Exploited - - - 2022-08-17 + + Intentional Misuse + Intentional Misuse + accepted - Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Security Breach - Security Breach - - + + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Unauthorised System Access - Unauthorised System Access - - + + System Intrusion + Something that acts as or causes System Intrusion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Impact on Data Subject - Impact on Data Subject - - 2022-10-22 + + Accidental Misuse + Accidental Misuse + accepted - Harshvardhan J. Pandit, Georg P. Krog - + - - System Intrusion - System Intrusion - - - 2022-08-17 + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - Harshvardhan J. Pandit - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Brute Force Authorisations - Brute Force Authorisations - - + + Data Corruption + Something that acts as or causes Corruption of Data + + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - - Extorsion - Extorsion - - + + Terrorism + Something that acts as or causes Terrorism + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Danger to Personnel - Danger to Personnel - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Child Violence - Child Violence - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Remuneration - Renumeration provided as compensation (as an impact) - - 2024-04-14 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - - - Loss of Competitive Advantage - Loss of Competitive Advantage - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Financial Investigation Costs - Financial Investigation Costs - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Prevent Exercising of Rights - Prevent Exercising of Rights - - 2022-08-18 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Attack on Private Life - Attack on Private Life - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Denial of Service Attack (DoS) - Denial of Service Attack (DoS) - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Unauthorised Access to Premises - Unauthorised Access to Premises - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unwanted Code Deletion - Unwanted Code Deletion - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Loss of Reputation - Loss of Reputation - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Vandalism - Vandalism - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Cost of Operation Interruption - Cost of Operation Interruption - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Loss of Control over Data - Loss of Control over Data - - 2022-08-19 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - - - Physical Spying - Physical Spying - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Corruption of Data - Corruption of Data - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Loss of Opportunity - Loss of Opportunity - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Examples for Data Privacy Vocabulary - - - - - - - - Government Crisis - Government Crisis - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Violation of Statutory Obligations - Violation of Statutory Obligations - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Retrieval of Discarded Equipment - Retrieval of Discarded Equipment - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Retrieval of Deleted Data - Retrieval of Deleted Data - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Scam - Scam - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Loss of Funds - Loss of Funds - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Phishing Scam - A type of social engineering attack involving deceptive messages intended to reveal sensitive information - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - System Failure - System Failure - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Detriment to Recovery - Detriment to Recovery - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Vulnerability Exploited - Vulnerability Exploited - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Citizens impact - Citizens impact - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Terrorism - Terrorism - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Business disruption - Business disruption - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Reputation and trust impact - Reputation and trust impact - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Equipment Malfunction - Equipment Malfunction - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Harmful Speech - Harmful Speech - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - System Malfunction - System Malfunction - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Injury - Injury - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Danger to Customers - Danger to Customers - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Damage by Third Party - Damage by Third Party - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Stalking - Stalking - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Consequence for Data Subject - Consequence for Data Subject - - 2022-10-22 - accepted - Harshvardhan J. Pandit, Georg P. Krog - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Unauthorised Information Disclosure - Unauthorised Information Disclosure - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Cost of Suspended Operations - Cost of Suspended Operations - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Discrimination - Discrimination - - 2022-08-19 - accepted - Georg P. Krog - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Reward - Reward provided as compensation (as an impact) - - 2024-04-14 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Spying - Spying - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Violation of Code of Conduct - Violation of Code of Conduct - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Theft of Equipment - Theft of Equipment - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Privacy impact - Privacy impact - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Impact to Rights - Impact to Rights - - - 2022-08-17 + + Component Failure + Something that acts as or causes Component Failure + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Malware Attack - Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - - - 2022-08-17 - accepted - Harshvardhan J. Pandit + + Fee + Something that acts as or provides fees e.g. for using a service + + DGA 2.10 + 2024-04-14 + 2024-08-16 + modified + Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Physical Stalking - Physical Stalking - - - 2022-08-17 + + Internal Security Threat + Concepts associated with security threats and issues that originate within the organisation + accepted - Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Replacement Costs - Replacement Costs - - - 2022-08-17 + + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Misinformation and Disinformation - Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) - - + + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - N3 serialiation - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Compliance impact - Compliance impact - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unauthorised Data Access - Unauthorised Data Access - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Abusive Content Utilisation - Abusive Content Utilisation - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Social Disadvantage - Social Disadvantage - - 2022-08-19 - accepted - Georg P. Krog - - - - + - - Organisation Disruption - Organisation Disruption - - - 2022-08-17 + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + accepted - Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - + - - Loss of Negotiating Capacity - Loss of Negotiating Capacity - - - 2022-08-17 + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals accepted - Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Spam - Spam - - - 2022-08-17 + + Misuse + Something that acts as or causes Misuse + + 2024-06-11 + 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + ENISA Threat Landscape for Ransomware Attacks 2022 https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Vulnerability Created - Vulnerability Created - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + - - Health and life impact - Health and life impact - - - 2022-08-17 + + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 + 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Payment - Payment provided as compensation (as an impact) - - 2024-04-14 + + Operational Security Risk + Risks and issues that arise during operational processes + accepted - Georg P. Krog, Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ENISA Threat Taxonomy 2016 https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - Loss of Goodwill - Loss of Goodwill - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html diff --git a/2.1-dev/risk/modules/risk_consequences.ttl b/2.1-dev/risk/modules/risk_consequences.ttl index cdf3bee92..b23e5df5b 100644 --- a/2.1-dev/risk/modules/risk_consequences.ttl +++ b/2.1-dev/risk/modules/risk_consequences.ttl @@ -15,2427 +15,1664 @@ @prefix vann: . @prefix xsd: . -risk:AbusiveContentUtilisation a rdfs:Class, +risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Abusive Content Utilisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Abusive Content Utilisation"@en . - -risk:AttackonPrivateLife a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Attack on Private Life"@en ; + skos:broader risk:UserRisks ; + skos:definition "Accidental Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Attack on Private Life"@en . + skos:prefLabel "Accidental Misuse"@en . risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Authorisation Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . +risk:AvailabilityBreach a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . + risk:Benefit a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes benefits"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Benefit"@en . risk:Blackmail a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Blackmail"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Brute Force Authorisations"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . -risk:BusinessImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Business impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business impact"@en . - -risk:BusinessPerformanceImpairment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business Performance Impairment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business Performance Impairment"@en . - -risk:Businessdisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business disruption"@en . - -risk:ChildViolence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Child Violence"@en . - -risk:CitizensImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Citizens impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Citizens impact"@en . - risk:Coercion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Coercion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . risk:Compensation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Benefit ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compensation"@en . -risk:ComplianceImpact a rdfs:Class, +risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Compliance impact"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compliance impact"@en . + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk:CompromiseAccount a rdfs:Class, +risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account"@en . + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk:CompromiseAccountCredentials a rdfs:Class, +risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account Credentials"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:prefLabel "Compromise Account"@en . -risk:CompromiseAccountSecurity a rdfs:Class, +risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Compromise Account Security"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Security"@en . + skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Confidentiality Breach"@en ; + skos:broader risk:DataBreach ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . -risk:ConsequenceForDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence for Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk:ConsequenceOnDataSecurity a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence on Data Security"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence on Data Security"@en . - risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Copyright Violation"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Copyright Violation"@en . -risk:CorruptionData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Corruption of Data"@en . - -risk:CostAcquisition a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Acquisition"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Acquisition"@en . - -risk:CostBackup a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Backup"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Backup"@en . - -risk:CostConfiguration a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Configuration"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Configuration"@en . - -risk:CostInstallation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Installation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Installation"@en . - -risk:CostJudicialPenalties a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk:CostJudicialProceedings a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk:CostOperationInterruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Operation Interruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk:CostSuspendedOperations a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Suspended Operations"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . -risk:CyberSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Spying"@en . - -risk:CyberStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Stalking"@en . - risk:Damage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Damage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Damage"@en . -risk:DamageByThirdParty a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Damage by Third Party"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Damage by Third Party"@en . - -risk:DangertoCustomers a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Customers"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Customers"@en . - -risk:DangertoPersonnel a rdfs:Class, +risk:DataBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex:E0069, + dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Personnel"@en ; + skos:broader risk:SecurityBreach ; + skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Personnel"@en . + skos:prefLabel "Data Breach"@en . -risk:DataBreach a rdfs:Class, +risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex:E0069, - dex:E0071 ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Data Breach"@en ; + sw:term_status "modified"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Data Breach"@en . + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk:Detriment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Detriment"@en . -risk:DetrimentToRecovery a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Detriment to Recovery"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Detriment to Recovery"@en . - risk:Discrimination a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Discrimination"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk:Eavesdropping a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Eavesdropping"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Eavesdropping"@en . - -risk:EconomicDisadvantage a rdfs:Class, +risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Economic Disadvantage"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Economic Disadvantage"@en . + skos:prefLabel "Environmental Risk"@en . -risk:EnvironmentalSafetyEndangerment a rdfs:Class, +risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Environmental Safety Endangerment"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:EquipmentFailure a rdfs:Class, +risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Equipment Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Failure"@en . + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:EquipmentMalfunction a rdfs:Class, +risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Equipment Malfunction"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Malfunction"@en . + skos:prefLabel "Erroneous System Use"@en . -risk:ErroneousSystemUse a rdfs:Class, +risk:ExposureToHarmfulSpeech a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Erroneous System Use"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Harmful Speech"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Erroneous System Use"@en . + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk:ExternalSecurityThreat a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "External Security Threat"@en . risk:Extorsion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Extorsion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . risk:Fee a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + sw:term_status "modified"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fee"@en . -risk:FinancialEquipmentCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Equipment Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk:FinancialInvestigationCosts a rdfs:Class, +risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Investigation Costs"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Financial Loss"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Financial Loss"@en . -risk:FinancialPersonnelCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Personnel Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk:FinancialRepairCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Repair Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Repair Costs"@en . - risk:Fraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Fraud"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . -risk:GovernmentCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Government Crisis"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Government Crisis"@en . - risk:Harm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes harms"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Harm to humans"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harm"@en . - -risk:HarmfulSpeech a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harmful Speech"@en . - -risk:HealthLifeImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Health and life impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Health and life impact"@en . + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Human Errors"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Human Errors"@en . -risk:IdentityDispute a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Identity Dispute"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Identity Dispute"@en . - risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Fraud"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Theft"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . -risk:IllegalProcessingData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Illegal Processing of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Illegal Processing of Data"@en . - -risk:ImpactOnDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact on Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact on Data Subject"@en . - -risk:ImpactToRights a rdfs:Class, +risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact to Rights"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact to Rights"@en . + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . -risk:IncreaseInternalCost a rdfs:Class, +risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Increase Internal Cost"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Increase Internal Cost"@en . + skos:prefLabel "Individual Health & Safety"@en . -risk:IndustrialCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk:IndividualRisk a rdfs:Class, + skos:Concept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Industrial Crisis"@en ; + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Industrial Crisis"@en . + skos:prefLabel "Individual Risk"@en . risk:Injury a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Injury"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Injury"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Injury"@en . -risk:InterceptionCommunications a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Interception of Communications"@en . - -risk:InternalOperationDisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Internal Operation Disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk:KnownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk:LawEnforcementAdverseEffects a rdfs:Class, +risk:IntegrityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . -risk:LimitationOfRights a rdfs:Class, +risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Limitation of Rights"@en ; + skos:broader risk:UserRisks ; + skos:definition "Intentional Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Limitation of Rights"@en . + skos:prefLabel "Intentional Misuse"@en . -risk:LossAssets a rdfs:Class, +risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Assets"@en ; + sw:term_status "modified"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Assets"@en . + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:LossCompetitiveAdvantage a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Competitive Advantage"@en . - -risk:LossControlOverData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Control over Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Control over Data"@en . - -risk:LossCredibility a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Credibility"@en . - -risk:LossCustomerConfidence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Customer Confidence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customer Confidence"@en . - -risk:LossCustomers a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Customers"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customers"@en . - -risk:LossData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Data"@en . - -risk:LossFunds a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk:InternalSecurityThreat a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Funds"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Funds"@en . + skos:prefLabel "Internal Security Threat"@en . -risk:LossGoods a rdfs:Class, +risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Goods"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goods"@en . + skos:prefLabel "Judicial Costs"@en . -risk:LossGoodwill a rdfs:Class, +risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Goodwill"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goodwill"@en . + skos:prefLabel "Judicial Penalty"@en . -risk:LossNegotiatingCapacity a rdfs:Class, +risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Negotiating Capacity"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:prefLabel "Legal Risk"@en . -risk:LossOpportunity a rdfs:Class, +risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Opportunity"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Credibility"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Opportunity"@en . + skos:prefLabel "Lose of Credibility"@en . -risk:LossProprietaryInformation a rdfs:Class, +risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Proprietary Information"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:prefLabel "Lose of Customer Confidence"@en . -risk:LossReputation a rdfs:Class, +risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Reputation"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Reputation"@en . + skos:prefLabel "Lose of Goodwill"@en . -risk:LossResources a rdfs:Class, +risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Resources"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Resources"@en . + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk:LossSuppliers a rdfs:Class, +risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Suppliers"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Suppliers"@en . + skos:prefLabel "Lose of Opportunity"@en . -risk:LossTechnologicalAdvantage a rdfs:Class, +risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Technological Advantage"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Reputation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:prefLabel "Lose of Reputation"@en . -risk:LossTrust a rdfs:Class, +risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Trust"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Trust"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Trust"@en . + skos:prefLabel "Lose of Trust"@en . risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Material Damage"@en . - -risk:MisinformationDisinformation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk:Misuse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Misuse"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Misuse"@en . -risk:MisuseBreachedInformation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Misuse of Breached Information"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misuse of Breached Information"@en . - risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes non-material damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Non-Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Non-Material Damage"@en . + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk:OrganisationDisruption a rdfs:Class, +risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Organisation Disruption"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Organisation Disruption"@en . + skos:prefLabel "Operational Security Risk"@en . risk:Payment a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Personal Safety Endangerment"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Personal Safety Endangerment"@en . -risk:PersonnelAbsence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Personnel Absence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Personnel Absence"@en . - risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Physical Assault"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Physical Assault"@en . -risk:PhysicalSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Spying"@en . - -risk:PhysicalStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Stalking"@en . - -risk:PreventExercisingOfRights a rdfs:Class, +risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Prevent Exercising of Rights"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk:PrivacyImpact a rdfs:Class, +risk:Privacy a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Privacy impact"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Psychological Harm"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Public Order Breach"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Public Order Breach"@en . -risk:RansomwareAttack a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Ransomware Attack"@en . - risk:Reidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Re-identification"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Re-identification"@en . + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . -risk:RemoteSpying a rdfs:Class, +risk:Renumeration a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Remote Spying"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Remote Spying"@en . + skos:prefLabel "Remuneration"@en . -risk:Renumeration a rdfs:Class, +risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:Impact ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Remuneration"@en . + skos:prefLabel "Reputational Risk"@en . -risk:ReplacementCosts a rdfs:Class, +risk:Reward a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Replacement Costs"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Replacement Costs"@en . + skos:prefLabel "Reward"@en . -risk:ReputationTrustImpact a rdfs:Class, +risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Reputation and trust impact"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reputation and trust impact"@en . + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk:RetrievalDeletedData a rdfs:Class, +risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Deleted Data"@en ; + skos:broader dpv:Impact, + risk:SocietalRisk ; + skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk:RetrievalDiscardedEquipment a rdfs:Class, +risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Discarded Equipment"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Limitation of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . -risk:Reward a rdfs:Class, +risk:RightsViolation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Reward provided as compensation (as an impact)"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Violation of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reward"@en . + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sabotage"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . risk:Scam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Scam"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . -risk:SecurityBreach a rdfs:Class, +risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Security Breach"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Security Breach"@en . + skos:prefLabel "Security Attack"@en . -risk:ServiceInterruption a rdfs:Class, +risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Service Interruption"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Service Interruption"@en . + skos:prefLabel "Security Breach"@en . risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sexual Violence"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sexual Violence"@en . risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Social Disadvantage"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Social Disadvantage"@en . -risk:Spam a rdfs:Class, +risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spam"@en ; + skos:broader risk:SocietalRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spam"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk:Spoofing a rdfs:Class, +risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spoofing"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spoofing"@en . + skos:prefLabel "Societal Risk"@en . -risk:Spying a rdfs:Class, +risk:Spoofing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spying"@en . - -risk:Stalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Stalking"@en ; + skos:broader risk:ExternalSecurityThreat, + risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Stalking"@en . + skos:prefLabel "Spoofing"@en . risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Failure"@en . + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Intrusion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Malfunction"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Malfunction"@en . + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Terrorism"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Terrorism"@en . -risk:Theft a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft"@en . - -risk:TheftEquipment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Equipment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Equipment"@en . - -risk:TheftMedia a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Media"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Media"@en . - -risk:ThirdPartyOperationDisruption a rdfs:Class, +risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Third Party Operation Disruption"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Third Party Operation Disruption"@en . + skos:prefLabel "Unauthorised Access to Premises"@en . -risk:UnauthorisedAccesstoPremises a rdfs:Class, +risk:UnauthorisedActivity a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Access to Premises"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unauthorised Access to Premises"@en . + skos:prefLabel "Unauthorised Activity"@en . risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised Code Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Data Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . -risk:UnauthorisedImpersonation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Impersonation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Reidentification ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Resource Use"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised System Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised System Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . -risk:UnknownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Code Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Data Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk:Vandalism a rdfs:Class, +risk:UserRisks a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "User Risks"@en . + +risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Vandalism"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vandalism"@en . + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk:ViolationCodeConduct a rdfs:Class, +risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Code of Conduct"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Code of Conduct"@en . + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk:ViolationContractualObligations a rdfs:Class, +risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Contractual Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Contractual Obligations"@en . + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk:ViolationEthicalCode a rdfs:Class, +risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Ethical Code"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Ethical Code"@en . + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . -risk:ViolationOfRights a rdfs:Class, +risk:ViolatingPolicy a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Violation of Rights"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Rights"@en . + skos:prefLabel "Violating Policy"@en . -risk:ViolationRegulatoryObligations a rdfs:Class, +risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Regulatory Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk:ViolationStatutoryObligations a rdfs:Class, +risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Statutory Obligations"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Child Violence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk:VulnerabilityCreated a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Created"@en ; + skos:broader risk:InternalSecurityThreat ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Vulnerability Created"@en . -risk:VulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Exploited"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/modules/risk_controls-owl.jsonld b/2.1-dev/risk/modules/risk_controls-owl.jsonld index 47c5134ff..041ec7a3a 100644 --- a/2.1-dev/risk/modules/risk_controls-owl.jsonld +++ b/2.1-dev/risk/modules/risk_controls-owl.jsonld @@ -1,11 +1,16 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -19,7 +24,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -31,28 +36,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -66,7 +66,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -78,18 +78,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -113,7 +113,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -125,18 +125,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -172,21 +172,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -219,18 +219,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -254,7 +254,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -266,21 +266,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -301,7 +301,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -313,40 +313,33 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-05-19" } ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -354,7 +347,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -366,18 +359,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -401,7 +394,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -413,18 +406,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -460,21 +453,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Monitor Control" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -518,7 +511,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -549,39 +542,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -591,54 +584,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Control that changes Consequence" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Change Consequence" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -662,7 +639,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -674,55 +651,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Control to contain event" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Containment Control" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, @@ -774,28 +740,28 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@value": "Risk Concepts - N3 serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -805,12 +771,17 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -836,161 +807,217 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@value": "http://www.w3.org/2004/02/skos/core" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/hasVersion": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@value": "https://w3id.org/dpv/risk" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/guides" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "http://purl.org/ontology/bibo/status/published" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@value": "risk" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@language": "en", + "@value": "RISK" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1011,7 +1038,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1023,59 +1050,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TR/json-ld11/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Risk Concepts - JSON-LD serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1089,7 +1111,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1101,214 +1123,138 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/hasVersion": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "2024-07-13" + "@id": "https://w3id.org/dpv/examples" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://www.w3.org/" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Risk Concepts" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "risk" + "@language": "en", + "@value": "Control to identify characteristics of event" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Identification Control" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "RISK" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1332,7 +1278,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1344,13 +1290,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Share Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, @@ -1386,12 +1363,17 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1405,7 +1387,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1417,23 +1399,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1459,21 +1446,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1494,7 +1481,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1506,49 +1493,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1572,7 +1575,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1584,20 +1587,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -1606,11 +1616,6 @@ "@value": "2024-05-19" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1618,7 +1623,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1630,28 +1635,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1665,7 +1665,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1677,13 +1677,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Recovery Control" } ] } diff --git a/2.1-dev/risk/modules/risk_controls-owl.rdf b/2.1-dev/risk/modules/risk_controls-owl.rdf index 82c0a6004..2c4c25e7b 100644 --- a/2.1-dev/risk/modules/risk_controls-owl.rdf +++ b/2.1-dev/risk/modules/risk_controls-owl.rdf @@ -12,432 +12,432 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - Consequence Control - + + - Risk Mitigation Measure that controls the Consequences + Control to contain event + Containment Control accepted 2024-05-19 - Harshvardhan J. Pandit - - + + - Control that monitors a Risk Consequence + Control that reduces the likelihood or severity of an event accepted - Monitor Consequence + Reduction Control 2024-05-19 - Harshvardhan J. Pandit - + + + + + accepted + 2024-05-19 + Control that modifies risk + + Risk Control + + + - - - + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + - - - - http://purl.org/ontology/bibo/status/published - - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - Harshvardhan J. Pandit + 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 + 10.5281/zenodo.12505841 - https://w3id.org/dpv/risk - 2.1-dev - risk http://www.w3.org/2004/02/skos/core http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + 2022-08-14 + http://purl.org/ontology/bibo/status/published + Harshvardhan J. Pandit Risk Concepts + RISK + + + risk - + + + + + + + Risk Concepts - RDF/XML serialiation + + + Reduce Likelihood + accepted 2024-05-19 - Identification Control - + - Control to identify characteristics of event + Control that reduces the likelihood of an event + Harshvardhan J. Pandit - accepted - + - - + + Harshvardhan J. Pandit - Reduce Likelihood - Control that reduces the likelihood of an event - 2024-05-19 accepted + 2024-05-19 + Monitor Risk + Control that monitors a Risk - + - Reduce Severity + accepted + 2024-05-19 - 2024-05-19 Harshvardhan J. Pandit Control that reduces the severity of an event - accepted + Reduce Severity - - - Primer for Data Privacy Vocabulary - - - - - - - Control that monitors a Risk Impact - + + Control that removes Impact i.e. prevents it from materialising + Harshvardhan J. Pandit + accepted 2024-05-19 - Monitor Impact - Harshvardhan J. Pandit - - - - - - - - Risk Concepts - RDF/XML serialiation - - - - 2024-05-19 - - accepted - - - - - Risk Control - Control that modifies risk + Remove Impact + - + accepted - + - Harshvardhan J. Pandit - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders 2024-05-19 + Source Control + Risk Mitigation Measure that controls the Source + Harshvardhan J. Pandit - - Change Consequence + - accepted - Control that changes Consequence - Harshvardhan J. Pandit + accepted 2024-05-19 - - - - Examples for Data Privacy Vocabulary - - - - - - - - + Monitor Consequence + Control that monitors a Risk Consequence + + + + + Harshvardhan J. Pandit + Risk Mitigation Measure that controls Impacts accepted 2024-05-19 - Control that reduces the likelihood or severity of an event - Reduction Control + + Impact Control - Remedy Control - + - 2024-05-19 - Control to remedy consequences of event + Remedy Control + Control to remedy consequences of event accepted + 2024-05-19 - - - Risk Concepts - N3 serialiation - - - - + + + + + Harshvardhan J. Pandit + + accepted + 2024-05-19 + Monitor Impact + Control that monitors a Risk Impact + - + + + + + Change Impact accepted 2024-05-19 + Control that changes Impact Harshvardhan J. Pandit - + + + + Remove Source + + + accepted + 2024-05-19 + Harshvardhan J. Pandit Control that removes the risk source - Remove Source - + Risk Concepts - Turtle serialiation - + - - Risk Mitigation Measure that uses controls to monitor events + accepted + 2024-05-19 - Harshvardhan J. Pandit - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - 2024-05-19 - Monitor Control + Consequence Control + Risk Mitigation Measure that controls the Consequences + Harshvardhan J. Pandit - + + + + + + Risk Concepts - JSON-LD serialiation + + + + + Halt Source + Control that halts the risk source or prevents it from materialising + Harshvardhan J. Pandit accepted - 2024-05-19 - Control that removes Consequence i.e. prevents it from materialising - Harshvardhan J. Pandit - Remove Consequence - + - - - accepted - + + + Risk Concepts - N3 serialiation + + + + + + + - Containment Control + Monitor Control + Harshvardhan J. Pandit + accepted 2024-05-19 - Control to contain event - + Control that monitors another Control + + - accepted Detection Control + accepted 2024-05-19 Control to detect event - - Guides for Data Privacy Vocabulary - - - - - - - - 2024-05-19 + - Control that removes Impact i.e. prevents it from materialising - - accepted + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders Harshvardhan J. Pandit - Remove Impact - - - 2024-05-19 - - - - Avoid Source - accepted - Control that avoids the risk source - Harshvardhan J. Pandit - - - accepted - - Risk Mitigation Measure that controls Impacts - - - - Harshvardhan J. Pandit - 2024-05-19 - Impact Control - - - - - Risk Concepts - JSON-LD serialiation - - - - + + 2024-05-19 + Remove Consequence - Control that changes Impact accepted - Change Impact + Control that removes Consequence i.e. prevents it from materialising Harshvardhan J. Pandit - 2024-05-19 - + + Monitor Vulnerabilities + Harshvardhan J. Pandit + Control that monitors a Risk Vulnerability accepted 2024-05-19 - Harshvardhan J. Pandit - Control that monitors a Risk Vulnerability - Monitor Vulnerabilities - - Harshvardhan J. Pandit + + accepted + 2024-05-19 + Avoid Source - 2024-05-19 - Control that halts the risk source or prevents it from materialising + Harshvardhan J. Pandit - Halt Source - accepted + Control that avoids the risk source - - Risk Concepts - HTML serialiation - - - - - - - - - accepted - + + Risk Mitigation Measure that uses controls to monitor events + Harshvardhan J. Pandit + Monitor Control + accepted 2024-05-19 - Source Control - Risk Mitigation Measure that controls the Source + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + - - + + + + Examples for Data Privacy Vocabulary + + + + + + + Identification Control + accepted 2024-05-19 - Control to recover from event - Recovery Control - accepted + Control to identify characteristics of event - - + + Guides for Data Privacy Vocabulary + + + + + + + + - accepted - Harshvardhan J. Pandit - Monitor Risk Source - Control that monitors a Risk Source + accepted 2024-05-19 - + Control that changes Consequence + Harshvardhan J. Pandit + Change Consequence + - - 2024-05-19 + + + + + + + Primer for Data Privacy Vocabulary + + + Harshvardhan J. Pandit - Monitor Control accepted - Harshvardhan J. Pandit - Control that monitors another Control + 2024-05-19 + Monitor Risk Source + Control that monitors a Risk Source - - Harshvardhan J. Pandit - + + Recovery Control + + Control to recover from event accepted - Monitor Risk 2024-05-19 - Control that monitors a Risk - + + + + + + Risk Concepts - HTML serialiation + + + diff --git a/2.1-dev/risk/modules/risk_controls.csv b/2.1-dev/risk/modules/risk_controls.csv index 784c589f5..623fa31d0 100644 --- a/2.1-dev/risk/modules/risk_controls.csv +++ b/2.1-dev/risk/modules/risk_controls.csv @@ -1,28 +1,28 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorRisk,class,https://w3id.org/dpv/risk#MonitorRisk,Monitor Risk,Control that monitors a Risk,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Control,Control that monitors another Control,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control,Control to recover from event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RiskControl,class,https://w3id.org/dpv/risk#RiskControl,Risk Control,Control that modifies risk,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk -ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorRisk,class,https://w3id.org/dpv/risk#MonitorRisk,Monitor Risk,Control that monitors a Risk,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Control,Control that monitors another Control,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control,Control to recover from event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RiskControl,class,https://w3id.org/dpv/risk#RiskControl,Risk Control,Control that modifies risk,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk +ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_controls.jsonld b/2.1-dev/risk/modules/risk_controls.jsonld index 7033c627f..41b29beb7 100644 --- a/2.1-dev/risk/modules/risk_controls.jsonld +++ b/2.1-dev/risk/modules/risk_controls.jsonld @@ -1,16 +1,11 @@ [ { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#IdentificationControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -30,13 +25,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -47,16 +42,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } ], "http://purl.org/dc/terms/contributor": [ { @@ -65,103 +72,180 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "accepted" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "accepted" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -181,13 +265,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -198,12 +282,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -239,7 +323,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -250,22 +334,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -285,13 +364,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -302,22 +381,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -337,13 +411,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -354,7 +428,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Detection Control" } ] }, @@ -415,17 +489,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#ContainmentControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -451,7 +520,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -462,43 +531,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -528,13 +597,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -545,12 +614,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -580,13 +649,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -597,12 +666,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -632,13 +701,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -649,17 +718,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#MonitorRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -679,13 +753,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -696,12 +770,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk#ChangeImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -731,13 +805,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -748,74 +822,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -845,13 +888,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -862,22 +905,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk#RecoveryControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -897,13 +935,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -914,17 +952,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -944,13 +987,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -961,123 +1004,105 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Identification Control" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorControl", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Monitor Control" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1107,13 +1132,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1124,64 +1149,74 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Control that reduces the severity of an event" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Reduce Severity" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1211,13 +1246,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1228,12 +1263,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvoidSource", + "@id": "https://w3id.org/dpv/risk#ShareRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1263,13 +1298,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1280,283 +1315,299 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "Risk Mitigation Measure that controls Impacts" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Paul Ryan" - }, + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rob Brennan" - }, + "@value": "Impact Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SourceControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "accepted" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "Risk Mitigation Measure that controls the Source" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Source Control" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Risk Concepts" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "10.5281/zenodo.12505841" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "risk" + "@language": "en", + "@value": "Control that monitors a Risk Consequence" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Monitor Consequence" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "Risk Mitigation Measure that controls the Consequences" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#MonitorControl", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "Monitor Control" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -1566,7 +1617,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1596,13 +1647,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1613,12 +1664,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#DetectionControl", + "@id": "https://w3id.org/dpv/risk#ReductionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1649,7 +1700,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1660,74 +1711,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1763,7 +1752,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1774,17 +1763,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemedyControl", + "@id": "https://w3id.org/dpv/risk#MonitorImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1804,13 +1798,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1821,8 +1815,14 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Monitor Impact" } ] + }, + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] } ] \ No newline at end of file diff --git a/2.1-dev/risk/modules/risk_controls.rdf b/2.1-dev/risk/modules/risk_controls.rdf index a80f726e6..6f185e86e 100644 --- a/2.1-dev/risk/modules/risk_controls.rdf +++ b/2.1-dev/risk/modules/risk_controls.rdf @@ -12,15 +12,80 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Identification Control - Control to identify characteristics of event + Reduce Likelihood + Control that reduces the likelihood of an event + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + Source Control + Risk Mitigation Measure that controls the Source 2024-05-19 accepted + Harshvardhan J. Pandit + + + + + + + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + Remove Impact + Control that removes Impact i.e. prevents it from materialising + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + Remedy Control + Control to remedy consequences of event + + 2024-05-19 + accepted + + + + + + + + Monitor Consequence + Control that monitors a Risk Consequence + + 2024-05-19 + accepted + Harshvardhan J. Pandit @@ -37,6 +102,26 @@ + + + + + Containment Control + Control to contain event + + 2024-05-19 + accepted + + + + + + + + + + Risk Concepts - RDF/XML serialiation + @@ -81,39 +166,26 @@ - - - - - Recovery Control - Control to recover from event - - 2024-05-19 - accepted - - + + + + + + + Risk Concepts - HTML serialiation - + - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - + Identification Control + Control to identify characteristics of event + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - Primer for Data Privacy Vocabulary - - - @@ -141,33 +213,12 @@ - - - - - - - Risk Concepts - Turtle serialiation - - - - - - Reduce Severity - Control that reduces the severity of an event - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Consequence Control + Risk Mitigation Measure that controls the Consequences 2024-05-19 accepted @@ -175,83 +226,62 @@ - - - - - Examples for Data Privacy Vocabulary - - - - - - - - Reduction Control - Control that reduces the likelihood or severity of an event - - 2024-05-19 - accepted - - - - + - Reduce Likelihood - Control that reduces the likelihood of an event - + Monitor Control + Control that monitors another Control + 2024-05-19 accepted Harshvardhan J. Pandit - + - Halt Source - Control that halts the risk source or prevents it from materialising - + Reduce Severity + Control that reduces the severity of an event + 2024-05-19 accepted Harshvardhan J. Pandit - + - Containment Control - Control to contain event + Recovery Control + Control to recover from event 2024-05-19 accepted - + - Change Consequence - Control that changes Consequence - + Reduction Control + Control that reduces the likelihood or severity of an event + 2024-05-19 accepted - Harshvardhan J. Pandit - + - Monitor Control - Control that monitors another Control + Monitor Risk + Control that monitors a Risk 2024-05-19 accepted @@ -259,6 +289,14 @@ + + + + + + + Risk Concepts - Turtle serialiation + @@ -272,25 +310,25 @@ - + - Monitor Risk Source - Control that monitors a Risk Source - + Change Consequence + Control that changes Consequence + 2024-05-19 accepted Harshvardhan J. Pandit - + - Monitor Risk - Control that monitors a Risk + Monitor Risk Source + Control that monitors a Risk Source 2024-05-19 accepted @@ -298,33 +336,24 @@ - + - Remove Impact - Control that removes Impact i.e. prevents it from materialising - + Detection Control + Control to detect event + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - Guides for Data Privacy Vocabulary - - - - + - Remove Source - Control that removes the risk source + Halt Source + Control that halts the risk source or prevents it from materialising 2024-05-19 accepted @@ -332,14 +361,6 @@ - - - - - - - Risk Concepts - RDF/XML serialiation - @@ -353,12 +374,12 @@ - + - Consequence Control - Risk Mitigation Measure that controls the Consequences + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders 2024-05-19 accepted @@ -366,63 +387,26 @@ - + - Source Control - Risk Mitigation Measure that controls the Source - + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - Remedy Control - Control to remedy consequences of event - - 2024-05-19 - accepted - - - - + - - - - - Risk Concepts - JSON-LD serialiation - - - - - - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Detection Control - Control to detect event - - 2024-05-19 - accepted - - + + + Examples for Data Privacy Vocabulary + + @@ -437,34 +421,50 @@ - + - - - - - Risk Concepts - HTML serialiation + + + + + Risk Concepts - N3 serialiation - + - Monitor Consequence - Control that monitors a Risk Consequence - + Remove Source + Control that removes the risk source + 2024-05-19 accepted Harshvardhan J. Pandit - + + + + + Guides for Data Privacy Vocabulary + + + + + + + + Primer for Data Privacy Vocabulary + + + + - - - - Risk Concepts - N3 serialiation + + + + Risk Concepts - JSON-LD serialiation diff --git a/2.1-dev/risk/modules/risk_levels-owl.jsonld b/2.1-dev/risk/modules/risk_levels-owl.jsonld index 37c2f2a18..1257c0954 100644 --- a/2.1-dev/risk/modules/risk_levels-owl.jsonld +++ b/2.1-dev/risk/modules/risk_levels-owl.jsonld @@ -1,67 +1,9 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", - "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Risk is Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -75,11 +17,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -87,7 +24,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -99,19 +36,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "3 Severity Levels" } ] }, @@ -174,7 +105,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#Severity", @@ -193,7 +124,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -206,10 +137,10 @@ "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -221,27 +152,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Moderate Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -257,7 +188,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -267,10 +198,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -282,24 +210,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", "@type": [ "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -316,6 +244,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -323,7 +256,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -335,21 +274,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -365,7 +310,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -375,10 +320,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -390,26 +332,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" + "@value": "Extremely Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -436,13 +378,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -454,13 +396,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -473,8 +415,8 @@ { "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -499,14 +441,14 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, { "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -535,7 +477,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -554,7 +496,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -563,14 +505,11 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, { "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -582,136 +521,167 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "Very High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.9,xsd:decimal" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Very High Severity" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "3 Likelihood Levels" + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + } ], "http://purl.org/dc/terms/contributor": [ { @@ -720,136 +690,240 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/creator": [ { - "@value": "0.1,xsd:decimal" + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/hasVersion": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "2024-07-13" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "3 Risk Levels" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -865,7 +939,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -875,13 +949,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -893,26 +967,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -934,7 +1008,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -946,21 +1020,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -974,11 +1048,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -986,7 +1055,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -998,27 +1067,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1044,7 +1107,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1056,13 +1119,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" + "@value": "Extremely High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -1073,10 +1136,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1090,51 +1153,9 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskLevel" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "7 Risk Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", - "@type": [ - "https://w3id.org/dpv/owl#Severity", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1144,7 +1165,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1156,52 +1177,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@value": "Extremely High Likelihood" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1222,7 +1218,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1234,51 +1230,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/guides", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Guides for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://w3id.org/dpv/guides" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1293,6 +1289,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1300,7 +1301,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1312,18 +1319,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#Severity", @@ -1342,7 +1355,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1352,10 +1365,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1367,91 +1383,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" + "@value": "Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Level where Risk is High" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "High Risk" + "@id": "https://w3id.org/dpv/risk/risk-owl.html" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1477,13 +1460,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1495,13 +1478,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Moderate Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -1512,72 +1495,71 @@ ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "0.1,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@language": "en", + "@value": "Level where Risk is Very Low" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@language": "en", + "@value": "Very Low Risk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1603,10 +1585,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1618,13 +1600,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Very High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -1635,10 +1617,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1652,11 +1634,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1664,7 +1641,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1676,74 +1653,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#", - "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@language": "en", + "@value": "Scale with 3 Risk Levels from High to Low" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" + "@language": "en", + "@value": "3 Risk Levels" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -1752,178 +1724,166 @@ ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "0.9,xsd:decimal" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@language": "en", + "@value": "Level where Severity is Very High" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Very High Severity" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://www.w3.org/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Risk Concepts" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "risk" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "7 Risk Levels" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@type": [ + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/guides" - }, + "@value": "0.1,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Level where Likelihood is Very Low" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Very Low Likelihood" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1937,6 +1897,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1944,7 +1909,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1956,49 +1921,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@value": "Extremely Low Risk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#Severity", @@ -2017,7 +1957,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2027,13 +1967,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2045,58 +1982,74 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" + "@value": "Very Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Scale with 3 Likelihood Levels from High to Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2122,13 +2075,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2140,13 +2093,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" + "@value": "Low Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -2155,5 +2108,52 @@ "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#Likelihood" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "5 Likelihood Levels" + } + ] } ] \ No newline at end of file diff --git a/2.1-dev/risk/modules/risk_levels-owl.rdf b/2.1-dev/risk/modules/risk_levels-owl.rdf index bed2346ba..f37fdb0c6 100644 --- a/2.1-dev/risk/modules/risk_levels-owl.rdf +++ b/2.1-dev/risk/modules/risk_levels-owl.rdf @@ -12,540 +12,540 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - - https://w3id.org/dpv/risk# - - - - - - - - - http://purl.org/ontology/bibo/status/published - - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - Harshvardhan J. Pandit - 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 - - https://w3id.org/dpv/risk - 2.1-dev - risk - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - - 2022-08-14 - Risk Concepts - - - accepted + + Level where Risk is Very High + - Harshvardhan J. Pandit - Moderate Severity - 0.5,xsd:decimal - Level where Severity is Moderate - 2022-08-18 - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - - - - - - accepted + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Harshvardhan J. Pandit - Level where Severity is Extremely High - - - + 0.9,xsd:decimal + Very High Risk 2022-08-18 - Extremely High Severity - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 0.99,xsd:decimal - + + - - Level where Risk is Low - + + - Harshvardhan J. Pandit - Low Risk - 0.25,xsd:decimal + 0.1,xsd:decimal + Level where Likelihood is Very Low - accepted - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + Harshvardhan J. Pandit 2022-08-18 - - - + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + accepted + Very Low Likelihood + + - - 7 Risk Levels - + + 0.25,xsd:decimal + - - accepted - Scale with 7 Risk Levels from Extremely High to Extremely Low Harshvardhan J. Pandit 2022-08-18 - - - - - Primer for Data Privacy Vocabulary - - - - + + Low Likelihood + accepted + Level where Likelihood is Low + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + - accepted - Scale with 5 Severity Levels from Very High to Very Low - 2022-08-18 - 5 Severity Levels - + 5 Severity Levels Harshvardhan J. Pandit + Scale with 5 Severity Levels from Very High to Very Low + 2022-08-18 + accepted + - - Level where Risk is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Very High Risk + + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - + - accepted Harshvardhan J. Pandit + Level where Severity is Low + 0.25,xsd:decimal + Low Severity 2022-08-18 + accepted - 0.9,xsd:decimal - - + + + - - + + - 0.75,xsd:decimal - accepted - + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 Harshvardhan J. Pandit + 0.25,xsd:decimal + + Level where Risk is Low 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - Level where Risk is High - High Risk + Low Risk + accepted - - Low Likelihood - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 - + + + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev + https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + + + + + + + + 2.1-dev + 10.5281/zenodo.12505841 + + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + 2022-08-14 + http://purl.org/ontology/bibo/status/published + Harshvardhan J. Pandit + Risk Concepts + RISK + + + risk + + accepted - + - Level where Likelihood is Low + Level where Severity is Very High Harshvardhan J. Pandit - 0.25,xsd:decimal - - - + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + 0.9,xsd:decimal + Very High Severity + 2022-08-18 + + - - + - Risk Concepts - RDF/XML serialiation + + Risk Concepts - RDF/XML serialiation - + + + + + Harshvardhan J. Pandit + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + 2022-08-18 accepted - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - Harshvardhan J. Pandit + + + - + 2022-08-18 + + accepted + Level where Risk is Very Low + Very Low Risk 0.1,xsd:decimal - Very Low Likelihood - Level where Likelihood is Very Low - - + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + + - - - Level where Likelihood is Moderate - - - + + Moderate Risk + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 0.5,xsd:decimal - Moderate Likelihood - accepted Harshvardhan J. Pandit + + + 2022-08-18 - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - - - - - + Level where Risk is Moderate + accepted + + + + + - 0.01,xsd:decimal - accepted - Level where Likelihood is Extremely Low - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 + + 0.9,xsd:decimal + Very High Likelihood + accepted Harshvardhan J. Pandit - Extremely Low Likelihood + Level where Likelihood is Very High + - - High Likelihood - 0.75,xsd:decimal - accepted - Level where Likelihood is High - - + + + 7 Severity Levels Harshvardhan J. Pandit 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - - - + + Scale with 7 Severity Levels from Extremely High to Extremely Low + accepted + - - Harshvardhan J. Pandit - + + accepted + - 2022-08-18 - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - accepted - + 0.75,xsd:decimal + High Risk + 2022-08-18 + Level where Risk is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + Harshvardhan J. Pandit + + + - + + Level where Severity is Moderate - 2022-08-18 - 0.1,xsd:decimal - Level where Severity is Very Low - accepted - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - Very Low Severity Harshvardhan J. Pandit + accepted + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Moderate Severity + 0.5,xsd:decimal + 2022-08-18 + - + - Extremely Low Risk - 2022-08-18 + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 Level where Risk is Extremely Low - 0.01,xsd:decimal Harshvardhan J. Pandit + 0.01,xsd:decimal + Extremely Low Risk + 2022-08-18 accepted - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - - Examples for Data Privacy Vocabulary - - - - - - - - + + High Severity + 0.75,xsd:decimal + Harshvardhan J. Pandit + + Level where Severity is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 2022-08-18 - Scale with 7 Severity Levels from Extremely High to Extremely Low accepted - 7 Severity Levels - Harshvardhan J. Pandit - + + + - + + Level where Likelihood is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + Harshvardhan J. Pandit - + - Low Severity - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 0.25,xsd:decimal - 2022-08-18 - Level where Severity is Low + High Likelihood + 0.75,xsd:decimal + 2022-08-18 accepted - Harshvardhan J. Pandit - - - + + + - - accepted + + 3 Severity Levels + + + + Harshvardhan J. Pandit + Scale with 3 Severity Levels from High to Low + 2022-08-18 + accepted + + + + Harshvardhan J. Pandit + Moderate Likelihood - Harshvardhan J. Pandit - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low + 0.5,xsd:decimal - + Level where Likelihood is Moderate + 2022-08-18 + accepted + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + + - - 3 Severity Levels - + + 5 Likelihood Levels + - - accepted - Scale with 3 Severity Levels from High to Low Harshvardhan J. Pandit + Scale with 5 Likelihood Levels from Very High to Very Low 2022-08-18 - - - - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low accepted - + + + + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + - Harshvardhan J. Pandit 2022-08-18 - - - - - Risk Concepts - N3 serialiation - - - - + Level where Likelihood is Extremely Low + 0.01,xsd:decimal + Extremely Low Likelihood + Harshvardhan J. Pandit + accepted + + - - + + Very Low Severity + - Level where Risk is Very Low - - accepted + Level where Severity is Very Low The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 - Harshvardhan J. Pandit 0.1,xsd:decimal - Very Low Risk - - + Harshvardhan J. Pandit + 2022-08-18 + + accepted + + - + + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 0.99,xsd:decimal + 2022-08-18 - 2022-08-18 - Level where Severity is High - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 0.75,xsd:decimal - accepted + Extremely High Severity Harshvardhan J. Pandit - High Severity - + accepted + Level where Severity is Extremely High - - - + Risk Concepts - Turtle serialiation + - - Harshvardhan J. Pandit + - + + Scale with 7 Risk Levels from Extremely High to Extremely Low + Harshvardhan J. Pandit 2022-08-18 - 0.9,xsd:decimal - accepted - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Level where Likelihood is Very High - Very High Likelihood - - + accepted + 7 Risk Levels + - + + 0.99,xsd:decimal + - - accepted - Harshvardhan J. Pandit - Very High Severity 2022-08-18 - Level where Severity is Very High + accepted - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 0.9,xsd:decimal - - - - - Guides for Data Privacy Vocabulary - - - - - - - - - - - Risk Concepts - JSON-LD serialiation - - - - Level where Likelihood is Extremely High - + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Extremely High Likelihood - accepted - - - - 0.99,xsd:decimal Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 - - Risk Concepts - HTML serialiation - - - - - - - - 5 Likelihood Levels - + + Scale with 3 Likelihood Levels from High to Low + Harshvardhan J. Pandit 2022-08-18 - Scale with 5 Likelihood Levels from Very High to Very Low - accepted + 3 Likelihood Levels + accepted - - Level where Risk is Extremely High - + accepted - + - 0.99,xsd:decimal - Harshvardhan J. Pandit - Extremely High Risk + 2022-08-18 - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - - - Extremely Low Severity - - Level where Severity is Extremely Low - - - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - accepted - Harshvardhan J. Pandit 0.01,xsd:decimal - 2022-08-18 + Harshvardhan J. Pandit + Level where Severity is Extremely Low - + + + + + + Risk Concepts - JSON-LD serialiation + + + + + Risk Concepts - N3 serialiation + + + + + + + Harshvardhan J. Pandit + + + + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 0.99,xsd:decimal + 2022-08-18 - Moderate Risk accepted + Level where Risk is Extremely High + Extremely High Risk + + + + Scale with 5 Risk Levels from Very High to Very Low + 5 Risk Levels Harshvardhan J. Pandit - Level where Risk is Moderate - 0.5,xsd:decimal + accepted 2022-08-18 - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - - - + + + + + + + Examples for Data Privacy Vocabulary + + + 2022-08-18 - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - 7 Likelihood Levels accepted + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low Harshvardhan J. Pandit + + Guides for Data Privacy Vocabulary + + + + + + + + + + + + + Primer for Data Privacy Vocabulary + + + + + Risk Concepts - HTML serialiation + + + + diff --git a/2.1-dev/risk/modules/risk_levels.csv b/2.1-dev/risk/modules/risk_levels.csv index 625e109d2..d2b685924 100644 --- a/2.1-dev/risk/modules/risk_levels.csv +++ b/2.1-dev/risk/modules/risk_levels.csv @@ -1,31 +1,31 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -3LikelihoodLevels,class,https://w3id.org/dpv/risk#3LikelihoodLevels,3 Likelihood Levels,Scale with 3 Likelihood Levels from High to Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk -3RiskLevels,class,https://w3id.org/dpv/risk#3RiskLevels,3 Risk Levels,Scale with 3 Risk Levels from High to Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk -3SeverityLevels,class,https://w3id.org/dpv/risk#3SeverityLevels,3 Severity Levels,Scale with 3 Severity Levels from High to Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk -5LikelihoodLevels,class,https://w3id.org/dpv/risk#5LikelihoodLevels,5 Likelihood Levels,Scale with 5 Likelihood Levels from Very High to Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk -5RiskLevels,class,https://w3id.org/dpv/risk#5RiskLevels,5 Risk Levels,Scale with 5 Risk Levels from Very High to Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk -5SeverityLevels,class,https://w3id.org/dpv/risk#5SeverityLevels,5 Severity Levels,Scale with 5 Severity Levels from Very High to Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk -7LikelihoodLevels,class,https://w3id.org/dpv/risk#7LikelihoodLevels,7 Likelihood Levels,Scale with 7 Likelihood Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk -7RiskLevels,class,https://w3id.org/dpv/risk#7RiskLevels,7 Risk Levels,Scale with 7 Risk Levels from Extremely High to Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk -7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyLowLikelihood,class,https://w3id.org/dpv/risk#ExtremelyLowLikelihood,Extremely Low Likelihood,Level where Likelihood is Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyLowRisk,class,https://w3id.org/dpv/risk#ExtremelyLowRisk,Extremely Low Risk,Level where Risk is Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extremely Low Severity,Level where Severity is Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +3LikelihoodLevels,class,https://w3id.org/dpv/risk#3LikelihoodLevels,3 Likelihood Levels,Scale with 3 Likelihood Levels from High to Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk +3RiskLevels,class,https://w3id.org/dpv/risk#3RiskLevels,3 Risk Levels,Scale with 3 Risk Levels from High to Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk +3SeverityLevels,class,https://w3id.org/dpv/risk#3SeverityLevels,3 Severity Levels,Scale with 3 Severity Levels from High to Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk +5LikelihoodLevels,class,https://w3id.org/dpv/risk#5LikelihoodLevels,5 Likelihood Levels,Scale with 5 Likelihood Levels from Very High to Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk +5RiskLevels,class,https://w3id.org/dpv/risk#5RiskLevels,5 Risk Levels,Scale with 5 Risk Levels from Very High to Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk +5SeverityLevels,class,https://w3id.org/dpv/risk#5SeverityLevels,5 Severity Levels,Scale with 5 Severity Levels from Very High to Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk +7LikelihoodLevels,class,https://w3id.org/dpv/risk#7LikelihoodLevels,7 Likelihood Levels,Scale with 7 Likelihood Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk +7RiskLevels,class,https://w3id.org/dpv/risk#7RiskLevels,7 Risk Levels,Scale with 7 Risk Levels from Extremely High to Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk +7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyLowLikelihood,class,https://w3id.org/dpv/risk#ExtremelyLowLikelihood,Extremely Low Likelihood,Level where Likelihood is Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyLowRisk,class,https://w3id.org/dpv/risk#ExtremelyLowRisk,Extremely Low Risk,Level where Risk is Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extremely Low Severity,Level where Severity is Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_levels.jsonld b/2.1-dev/risk/modules/risk_levels.jsonld index b4b69e785..fbbef231a 100644 --- a/2.1-dev/risk/modules/risk_levels.jsonld +++ b/2.1-dev/risk/modules/risk_levels.jsonld @@ -1,10 +1,10 @@ [ { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -19,7 +19,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -35,16 +35,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -55,13 +52,13 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "Extremely High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, @@ -135,11 +132,23 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } ], "http://purl.org/dc/terms/contributor": [ { @@ -148,130 +157,174 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/creator": [ { - "@value": "0.9,xsd:decimal" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/identifier": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/issued": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "2024-07-13" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Very High Risk" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Risk Concepts" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/ontology/bibo/doi": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "10.5281/zenodo.12505841" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/ontology/bibo/status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@value": "0.9,xsd:decimal" + "@value": "risk" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "accepted" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@value": "2.1-dev" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@language": "en", - "@value": "Level where Likelihood is Very High" + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "Very High Likelihood" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -286,7 +339,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -302,19 +355,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -325,22 +372,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Extremely High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -355,7 +402,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -371,19 +418,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -394,22 +438,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" + "@value": "Very High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -435,13 +479,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -452,16 +496,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk#HighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -474,6 +518,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -487,13 +536,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -504,16 +559,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -528,7 +589,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -544,19 +605,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -567,22 +622,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Extremely Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -608,13 +663,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -625,16 +680,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -649,7 +704,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -665,13 +720,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -682,22 +743,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" + "@value": "Moderate Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -710,11 +771,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -728,13 +784,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -745,22 +801,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" + "@value": "7 Risk Levels" } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#LowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -773,6 +854,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -786,13 +872,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -803,47 +895,74 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Likelihood" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv#Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -856,6 +975,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -869,13 +993,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -886,16 +1013,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -926,19 +1059,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -949,7 +1082,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -960,73 +1093,114 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "0.9,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -1039,11 +1213,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1057,16 +1226,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1077,18 +1243,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1107,7 +1267,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1132,7 +1292,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1143,13 +1303,13 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Very Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, @@ -1223,122 +1383,100 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "7 Severity Levels" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.99,xsd:decimal" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Level where Risk is Extremely High" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Extremely High Risk" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1355,11 +1493,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1373,13 +1506,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1390,22 +1523,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -1431,13 +1558,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1448,16 +1575,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -1472,7 +1599,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1488,19 +1615,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1511,103 +1638,84 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.75,xsd:decimal" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Level where Risk is High" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "High Risk" + "@id": "https://w3id.org/dpv/risk/risk.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -1616,180 +1724,119 @@ ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv#RiskLevel" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "5 Risk Levels" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" ], - "http://purl.org/ontology/bibo/doi": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "10.5281/zenodo.12505841" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/ontology/bibo/status": [ + "http://purl.org/dc/terms/created": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "risk" + "@value": "0.5,xsd:decimal" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@language": "en", + "@value": "Level where Severity is Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Moderate Severity" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -1802,6 +1849,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1815,13 +1867,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1832,95 +1890,105 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Likelihood" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "0.1,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "Level where Likelihood is Very Low" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "Very Low Likelihood" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -1930,11 +1998,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -1949,7 +2017,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1965,19 +2033,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1988,18 +2053,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" + "@value": "Very Low Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2016,11 +2081,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2034,13 +2094,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2051,22 +2111,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -2081,7 +2135,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2097,16 +2151,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2117,49 +2168,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2176,6 +2196,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2189,13 +2214,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2206,47 +2231,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@value": "Extremely Low Risk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -2261,7 +2261,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2277,13 +2277,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2294,13 +2294,13 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" + "@value": "Extremely Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] } diff --git a/2.1-dev/risk/modules/risk_levels.rdf b/2.1-dev/risk/modules/risk_levels.rdf index 907e0f2e8..46b2eb572 100644 --- a/2.1-dev/risk/modules/risk_levels.rdf +++ b/2.1-dev/risk/modules/risk_levels.rdf @@ -12,32 +12,75 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Low Severity - Level where Severity is Low + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + High Severity + Level where Severity is High - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - Extremely Low Risk - Level where Risk is Extremely Low + Low Risk + Level where Risk is Low - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + + + Risk Concepts - RDF/XML serialiation + + + + + + Low Likelihood + Level where Likelihood is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit @@ -88,205 +131,158 @@ - + - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - + Extremely Low Likelihood + Level where Likelihood is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - - + - - Primer for Data Privacy Vocabulary + + + Risk Concepts - HTML serialiation - + - High Risk - Level where Risk is High + Extremely High Risk + Level where Risk is Extremely High - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - + + Extremely High Severity + Level where Severity is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + + Very High Risk + Level where Risk is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - High Likelihood - Level where Likelihood is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - Examples for Data Privacy Vocabulary - - - - + - - Very High Risk - Level where Risk is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - Low Likelihood - Level where Likelihood is Low + Very High Likelihood + Level where Likelihood is Very High - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - Very Low Risk - Level where Risk is Very Low + Moderate Risk + Level where Risk is Moderate - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit @@ -309,91 +305,92 @@ - + - - Very High Likelihood - Level where Likelihood is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + High Risk + Level where Risk is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - Extremely High Severity - Level where Severity is Extremely High + Extremely Low Severity + Level where Severity is Extremely Low - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - Extremely High Risk - Level where Risk is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - Moderate Likelihood - Level where Likelihood is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - Guides for Data Privacy Vocabulary - - + + + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + @@ -412,42 +409,29 @@ - - - - - Extremely Low Severity - Level where Severity is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + + + + + + + Risk Concepts - Turtle serialiation - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - RDF/XML serialiation - @@ -461,21 +445,17 @@ - - - - - - - Risk Concepts - JSON-LD serialiation - - + - - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - + + Moderate Likelihood + Level where Likelihood is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit @@ -498,15 +478,15 @@ - + - - Low Risk - Level where Risk is Low - - - + + Low Severity + Level where Severity is Low + + + 0.25,xsd:decimal The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 @@ -515,68 +495,88 @@ - + + + + + Examples for Data Privacy Vocabulary + + + + - - Moderate Risk - Level where Risk is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - - - - - Risk Concepts - HTML serialiation + + + + + Risk Concepts - N3 serialiation - + - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low - + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Extremely Low Likelihood - Level where Likelihood is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - - - - - Risk Concepts - N3 serialiation + + + Guides for Data Privacy Vocabulary + + + + + + + + Primer for Data Privacy Vocabulary + + + + + + + + + Risk Concepts - JSON-LD serialiation + diff --git a/2.1-dev/risk/modules/risk_matrix-owl.jsonld b/2.1-dev/risk/modules/risk_matrix-owl.jsonld index a4b658260..37e98d308 100644 --- a/2.1-dev/risk/modules/risk_matrix-owl.jsonld +++ b/2.1-dev/risk/modules/risk_matrix-owl.jsonld @@ -1,6 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -19,7 +19,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -41,21 +41,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -71,7 +71,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -93,18 +93,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -123,7 +123,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -145,18 +145,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -175,7 +175,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -185,7 +185,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -197,18 +197,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -244,18 +244,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -274,7 +274,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -284,7 +284,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -296,18 +296,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -326,7 +326,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -336,7 +336,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -348,18 +348,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -378,7 +378,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -388,7 +388,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -400,70 +400,80 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.24,xsd:decimal" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/examples" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -482,7 +492,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -504,21 +514,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -534,7 +544,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -556,49 +566,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -617,7 +596,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -627,7 +606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -639,18 +618,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -669,7 +648,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -691,21 +670,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -721,7 +700,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -731,7 +710,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -743,21 +722,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -773,7 +752,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -783,7 +762,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -795,18 +774,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -825,7 +804,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -835,7 +814,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -847,18 +826,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -877,7 +856,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -899,18 +878,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -929,7 +908,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -951,18 +930,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -981,7 +960,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1003,18 +982,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1033,7 +1012,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1055,49 +1034,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "0.33,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1116,7 +1116,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1126,7 +1126,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1138,18 +1138,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1168,7 +1168,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1190,217 +1190,229 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "0.44,xsd:decimal" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "Julian Flake" - }, + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "Moderate Risk (RM3x3 S:2 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.43,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "High Risk (RM7x7 S:7 L:3)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "Risk Concepts" + "@value": "0.10,xsd:decimal" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "risk" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@value": "0.67,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/owl" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1416,7 +1428,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1426,7 +1438,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1438,18 +1450,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1468,7 +1480,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1490,21 +1502,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1520,7 +1532,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1530,7 +1542,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1542,18 +1554,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1572,7 +1584,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1594,18 +1606,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1624,7 +1667,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1646,18 +1689,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1676,7 +1750,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1686,7 +1760,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1698,18 +1772,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1728,7 +1802,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1750,21 +1824,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1780,7 +1854,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1802,21 +1876,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1824,43 +1898,79 @@ "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Risk Matrix 7x7" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1889,7 +1999,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1901,18 +2011,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -1931,7 +2041,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1941,7 +2051,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1953,21 +2063,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1983,7 +2093,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2005,18 +2115,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2033,11 +2143,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2045,7 +2150,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2057,21 +2162,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2087,7 +2192,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2109,52 +2214,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2170,7 +2244,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2180,7 +2254,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2192,18 +2266,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2222,7 +2296,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2244,21 +2318,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2272,6 +2346,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2279,7 +2358,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2291,21 +2370,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2321,7 +2400,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2343,18 +2422,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2373,7 +2452,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2395,52 +2474,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2456,7 +2504,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2478,49 +2526,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2539,7 +2556,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2561,18 +2578,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2613,18 +2630,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2643,7 +2660,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2665,18 +2682,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2695,7 +2712,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2717,49 +2734,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2778,7 +2764,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2800,18 +2786,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2830,7 +2816,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2840,7 +2826,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2852,21 +2838,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2882,7 +2868,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2892,7 +2878,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2904,21 +2890,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2934,7 +2951,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2944,7 +2961,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2956,18 +2973,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2986,7 +3003,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3008,18 +3025,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3036,11 +3053,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3048,7 +3060,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3060,22 +3072,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + } ], "http://purl.org/dc/terms/contributor": [ { @@ -3084,98 +3111,175 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/creator": [ { - "@value": "0.67,xsd:decimal" + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "2024-07-13" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "RISK" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@value": "0.33,xsd:decimal" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "2.1-dev" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3194,7 +3298,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.11,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3204,7 +3308,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3216,70 +3320,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.86,xsd:decimal" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@id": "https://w3id.org/dpv/risk/risk-owl.html" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3298,7 +3381,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3308,7 +3391,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3320,21 +3403,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3350,7 +3433,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3360,7 +3443,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3372,18 +3455,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3402,7 +3485,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3424,18 +3507,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3454,7 +3537,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3476,21 +3559,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3506,7 +3589,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3528,18 +3611,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3558,7 +3641,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3568,7 +3651,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3580,18 +3663,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3610,7 +3693,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3620,7 +3703,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3632,18 +3715,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3662,7 +3745,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3672,7 +3755,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3684,18 +3767,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3714,7 +3797,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.44,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3724,7 +3807,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3736,21 +3819,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3766,7 +3849,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3776,7 +3859,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3788,18 +3871,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3818,7 +3901,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3840,70 +3923,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3922,7 +3984,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3944,18 +4006,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3974,7 +4036,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3996,21 +4058,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4026,7 +4088,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4048,21 +4110,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4078,7 +4140,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4100,18 +4162,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4130,7 +4192,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.73,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4152,18 +4214,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4182,7 +4244,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4192,7 +4254,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4204,18 +4266,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4234,7 +4296,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4244,7 +4306,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4256,18 +4318,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4286,7 +4348,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4296,7 +4358,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4308,18 +4370,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4338,7 +4400,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4348,7 +4410,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4360,21 +4422,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4390,7 +4452,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4412,18 +4474,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4442,7 +4504,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4452,7 +4514,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4464,49 +4526,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4525,7 +4556,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4547,21 +4578,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4577,7 +4608,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4587,7 +4618,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4599,18 +4630,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4629,7 +4660,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4639,7 +4670,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4651,21 +4682,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4681,7 +4712,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4691,7 +4722,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4703,18 +4734,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4733,7 +4764,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4755,21 +4786,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4785,7 +4816,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4795,7 +4826,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4807,18 +4838,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4837,7 +4868,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4847,7 +4878,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4859,44 +4890,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] } diff --git a/2.1-dev/risk/modules/risk_matrix-owl.rdf b/2.1-dev/risk/modules/risk_matrix-owl.rdf index ac929230d..7ea686054 100644 --- a/2.1-dev/risk/modules/risk_matrix-owl.rdf +++ b/2.1-dev/risk/modules/risk_matrix-owl.rdf @@ -12,1229 +12,1229 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - - https://w3id.org/dpv/risk# - - - - - - - - - http://purl.org/ontology/bibo/status/published - - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - Harshvardhan J. Pandit - 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 - - https://w3id.org/dpv/risk - 2.1-dev - risk - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - - 2022-08-14 - Risk Concepts - - - Extremely High Risk (RM7x7 S:5 L:6) - - - - 2022-08-17 + - 0.61,xsd:decimal + Very Low Risk (RM7x7 S:5 L:1) accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - Harshvardhan J. Pandit - - - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + 0.10,xsd:decimal - Moderate Risk (RM3x3 S:3 L:1) - 2022-08-17 - - accepted Harshvardhan J. Pandit - 0.33,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - - - 0.48,xsd:decimal - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High 2022-08-17 - - accepted + + + + 0.40,xsd:decimal Harshvardhan J. Pandit + 2022-08-17 + + accepted + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - + + + Low Risk (RM5x5 S:1 L:5) accepted - Harshvardhan J. Pandit - 0.31,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + 0.20,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - - High Risk (RM7x7 S:3 L:5) - + - 2022-08-17 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - Risk Matrix 7x7 - accepted Harshvardhan J. Pandit + accepted + Risk Matrix 7x7 + 2022-08-17 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - accepted - 0.12,xsd:decimal Harshvardhan J. Pandit 2022-08-17 - Very Low Risk (RM7x7 S:2 L:3) - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - Harshvardhan J. Pandit - - - - 0.86,xsd:decimal - Extremely High Risk (RM7x7 S:7 L:6) accepted - 2022-08-17 - + 0.61,xsd:decimal + Extremely High Risk (RM7x7 S:5 L:6) - - 2022-08-17 + accepted - 0.02,xsd:decimal - Harshvardhan J. Pandit - Extremely Low Risk (RM7x7 S:1 L:1) + 2022-08-17 + 0.16,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - - - accepted Harshvardhan J. Pandit - Extremely Low Risk (RM7x7 S:2 L:2) - 0.08,xsd:decimal + Low Risk (RM5x5 S:1 L:4) + + + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + Moderate Risk (RM7x7 S:2 L:7) + Harshvardhan J. Pandit + 0.29,xsd:decimal + accepted - + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:1 L:3) 2022-08-17 - 0.06,xsd:decimal + Very High Risk (RM7x7 S:6 L:4) - accepted Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + 0.49,xsd:decimal + accepted - - Harshvardhan J. Pandit + + accepted + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 2022-08-17 + + Harshvardhan J. Pandit + Moderate Risk (RM5x5 S:4 L:2) + 0.32,xsd:decimal + + + + + Very Low Risk (RM7x7 S:6 L:1) + 0.12,xsd:decimal accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + + + + Harshvardhan J. Pandit 2022-08-17 - 0.04,xsd:decimal - - Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - + + Low Risk (RM5x5 S:2 L:2) + Harshvardhan J. Pandit + accepted - 0.14,xsd:decimal + 2022-08-17 + 0.16,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + + + + + + 0.02,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Harshvardhan J. Pandit accepted 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - Low Risk (RM7x7 S:1 L:7) - - 2022-08-17 + - accepted + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.86,xsd:decimal + accepted + 0.24,xsd:decimal + 2022-08-17 + Moderate Risk (RM7x7 S:4 L:3) - Harshvardhan J. Pandit - 0.41,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 2022-08-17 - accepted High Risk (RM7x7 S:5 L:4) + + 0.41,xsd:decimal + Harshvardhan J. Pandit + accepted + 2022-08-17 - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + - accepted Harshvardhan J. Pandit 2022-08-17 + 0.86,xsd:decimal - Very Low Risk (RM7x7 S:5 L:1) - 0.10,xsd:decimal + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + accepted - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate 2022-08-17 - - + 0.32,xsd:decimal + - accepted Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:7 L:5) - 0.71,xsd:decimal - + Moderate Risk (RM5x5 S:2 L:4) + + - - accepted - Harshvardhan J. Pandit - + + - 0.40,xsd:decimal + Harshvardhan J. Pandit + accepted 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + Very Low Risk (RM5x5 S:2 L:1) - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + 0.08,xsd:decimal - - Harshvardhan J. Pandit - 0.10,xsd:decimal - Very Low Risk (RM7x7 S:1 L:5) - 2022-08-17 - - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + accepted - - - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - accepted - High Risk (RM5x5 S:5 L:2) Harshvardhan J. Pandit - 0.40,xsd:decimal - + 0.12,xsd:decimal + Very Low Risk (RM7x7 S:2 L:3) + - + - accepted Harshvardhan J. Pandit - - High Risk (RM7x7 S:3 L:6) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + 0.12,xsd:decimal 2022-08-17 - 0.37,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Very Low Risk (RM7x7 S:3 L:2) + - - Harshvardhan J. Pandit - 2022-08-17 - - accepted - 0.12,xsd:decimal - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + - - - accepted - High Risk (RM5x5 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - 0.60,xsd:decimal 2022-08-17 + 0.29,xsd:decimal - - - - + Moderate Risk (RM7x7 S:7 L:2) + - + + Harshvardhan J. Pandit + accepted 2022-08-17 - Moderate Risk (RM7x7 S:4 L:3) - 0.24,xsd:decimal - accepted - - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - Harshvardhan J. Pandit - - - - accepted - Harshvardhan J. Pandit - 0.22,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - Low Risk (RM3x3 S:1 L:2) - 2022-08-17 - - + Very High Risk (RM5x5 S:3 L:5) + 0.60,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + - - - Risk Concepts - HTML serialiation - - - - + + + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev + https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + + + + + + + + 2.1-dev + 10.5281/zenodo.12505841 + + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + + 2022-08-14 + http://purl.org/ontology/bibo/status/published + Harshvardhan J. Pandit + RISK + Risk Concepts + + + risk - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.57,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High 2022-08-17 + Very High Risk (RM7x7 S:4 L:7) - + - accepted Harshvardhan J. Pandit - 0.33,xsd:decimal - High Risk (RM7x7 S:4 L:4) + accepted - - 0.22,xsd:decimal + - accepted + 0.08,xsd:decimal + Very Low Risk (RM7x7 S:1 L:4) Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low 2022-08-17 + accepted - Low Risk (RM3x3 S:2 L:1) - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + - + - 2022-08-17 - - 0.12,xsd:decimal - accepted Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - - - 0.43,xsd:decimal + accepted 2022-08-17 + 0.04,xsd:decimal - accepted - Harshvardhan J. Pandit - High Risk (RM7x7 S:7 L:3) + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - Risk Matrix 3x3 - + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Very Low Risk (RM5x5 S:1 L:2) - - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - 2022-08-17 - - accepted - Harshvardhan J. Pandit - - - - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - Harshvardhan J. Pandit - - 2022-08-17 - Moderate Risk (RM7x7 S:6 L:2) - 0.24,xsd:decimal - + Harshvardhan J. Pandit accepted - - - - Primer for Data Privacy Vocabulary - - - - - - - 2022-08-17 - accepted - Harshvardhan J. Pandit 0.08,xsd:decimal - - - - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - + - - + accepted - Harshvardhan J. Pandit - Low Risk (RM7x7 S:5 L:2) - - - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 0.20,xsd:decimal - 2022-08-17 - - - 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High 0.37,xsd:decimal - - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - High Risk (RM7x7 S:6 L:3) - accepted Harshvardhan J. Pandit + High Risk (RM7x7 S:3 L:6) + - - Very High Risk (RM7x7 S:6 L:5) - accepted - Harshvardhan J. Pandit + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - 2022-08-17 + 0.12,xsd:decimal - 0.61,xsd:decimal - - - - 2022-08-17 - accepted + Very Low Risk (RM5x5 S:1 L:3) Harshvardhan J. Pandit - - - - - Very High Risk (RM5x5 S:3 L:5) - 0.60,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + accepted Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 0.67,xsd:decimal - + High Risk (RM3x3 S:3 L:2) - 2022-08-17 - accepted Harshvardhan J. Pandit - - - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High 2022-08-17 + 0.67,xsd:decimal - - - - 0.43,xsd:decimal - accepted - Harshvardhan J. Pandit - Very High Risk (RM7x7 S:3 L:7) - + - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - Harshvardhan J. Pandit - 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + Harshvardhan J. Pandit + accepted Very Low Risk (RM5x5 S:1 L:1) + 2022-08-17 0.04,xsd:decimal - + + 0.04,xsd:decimal + Harshvardhan J. Pandit + accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low 2022-08-17 + Extremely Low Risk (RM7x7 S:1 L:2) + + + + Low Risk (RM7x7 S:4 L:2) accepted + + + Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:1 L:2) - 0.08,xsd:decimal - + 2022-08-17 + + 0.16,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + - + + Harshvardhan J. Pandit 0.20,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit Low Risk (RM5x5 S:5 L:1) + accepted + 2022-08-17 Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - 2022-08-17 - - accepted - 0.12,xsd:decimal - Harshvardhan J. Pandit + - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + Harshvardhan J. Pandit + + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + 2022-08-17 + Extremely High Risk (RM7x7 S:7 L:7) + 0.99,xsd:decimal - - 0.20,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:2 L:6) + 0.24,xsd:decimal + + accepted 2022-08-17 - Low Risk (RM7x7 S:2 L:5) + + + + 0.24,xsd:decimal accepted - Harshvardhan J. Pandit - - - - Moderate Risk (RM3x3 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Moderate Risk (RM7x7 S:3 L:4) - 2022-08-17 - - accepted Harshvardhan J. Pandit - 0.33,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - + 2022-08-17 + - - - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + - accepted Harshvardhan J. Pandit - Risk Matrix 5x5 2022-08-17 - + + Low Risk (RM3x3 S:1 L:2) + 0.22,xsd:decimal + accepted + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + - + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + Moderate Risk (RM5x5 S:3 L:2) + 0.24,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 accepted - Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:1 L:3) - 0.12,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.41,xsd:decimal + + + accepted + 2022-08-17 + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - High Risk (RM7x7 S:4 L:5) - 2022-08-17 - - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High Harshvardhan J. Pandit + 0.10,xsd:decimal - + + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + Low Risk (RM3x3 S:1 L:1) + 0.11,xsd:decimal + accepted - Moderate Risk (RM3x3 S:2 L:2) - 0.44,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 2022-08-17 - - accepted Harshvardhan J. Pandit + 2022-08-17 - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - + + accepted + - 0.36,xsd:decimal - Harshvardhan J. Pandit 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + Low Risk (RM7x7 S:3 L:3) - accepted - Moderate Risk (RM5x5 S:3 L:3) - - - - - - - Risk Concepts - RDF/XML serialiation - - + 0.18,xsd:decimal + Harshvardhan J. Pandit + - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - 0.80,xsd:decimal - + + - accepted Harshvardhan J. Pandit - 2022-08-17 - Very High Risk (RM5x5 S:4 L:5) + accepted - - - + 0.61,xsd:decimal + Very High Risk (RM7x7 S:6 L:5) 2022-08-17 - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + + - accepted - Harshvardhan J. Pandit - 0.99,xsd:decimal + Very High Risk (RM7x7 S:7 L:4) + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + 0.57,xsd:decimal + Harshvardhan J. Pandit + accepted - + + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low Harshvardhan J. Pandit + accepted 2022-08-17 + Low Risk (RM7x7 S:5 L:2) + 0.20,xsd:decimal - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.08,xsd:decimal - Very Low Risk (RM5x5 S:2 L:1) - + - - 0.06,xsd:decimal + - accepted Harshvardhan J. Pandit 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + accepted + 0.67,xsd:decimal - Extremely Low Risk (RM7x7 S:3 L:1) - + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + - + + 0.73,xsd:decimal + Harshvardhan J. Pandit - 0.67,xsd:decimal + accepted + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 2022-08-17 + Extremely High Risk (RM7x7 S:6 L:6) + + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + 0.43,xsd:decimal + Harshvardhan J. Pandit accepted - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High 2022-08-17 - 0.57,xsd:decimal - accepted - Harshvardhan J. Pandit - Very High Risk (RM7x7 S:7 L:4) - + High Risk (RM7x7 S:7 L:3) - + + Risk Matrix 5x5 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 2022-08-17 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - accepted - 0.48,xsd:decimal Harshvardhan J. Pandit - High Risk (RM5x5 S:4 L:3) - + accepted + 2022-08-17 + - - + + accepted + Risk Matrix 3x3 + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low Harshvardhan J. Pandit - Low Risk (RM7x7 S:7 L:1) - 0.14,xsd:decimal 2022-08-17 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + + + + Low Risk (RM7x7 S:2 L:5) + Harshvardhan J. Pandit accepted + 2022-08-17 + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + + + 0.20,xsd:decimal - - 2022-08-17 - 0.24,xsd:decimal + + Guides for Data Privacy Vocabulary + + + + + + + + Examples for Data Privacy Vocabulary + + + + + + + + + + + Primer for Data Privacy Vocabulary + + + + - Moderate Risk (RM7x7 S:3 L:4) + Harshvardhan J. Pandit + High Risk (RM5x5 S:5 L:3) + 0.60,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High accepted - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - Harshvardhan J. Pandit - + 2022-08-17 + - + accepted - Harshvardhan J. Pandit + Very Low Risk (RM7x7 S:1 L:6) - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - - 0.73,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + + 0.12,xsd:decimal - + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + accepted - 0.51,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 + Low Risk (RM7x7 S:1 L:7) - accepted - Harshvardhan J. Pandit - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + 0.14,xsd:decimal - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - Harshvardhan J. Pandit - + + - 0.20,xsd:decimal 2022-08-17 + Harshvardhan J. Pandit + 0.71,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High accepted - + Extremely High Risk (RM7x7 S:5 L:7) + - - Moderate Risk (RM7x7 S:7 L:2) + + + accepted + 2022-08-17 + 0.48,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 2022-08-17 - - accepted - 0.29,xsd:decimal Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - - - - - - - Guides for Data Privacy Vocabulary - - + High Risk (RM5x5 S:4 L:3) + - + Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + accepted 2022-08-17 + High Risk (RM5x5 S:3 L:4) - 0.99,xsd:decimal - High Risk (RM3x3 S:3 L:3) + 0.48,xsd:decimal + + + + 0.33,xsd:decimal + + Harshvardhan J. Pandit accepted + Moderate Risk (RM3x3 S:3 L:1) + + + + 2022-08-17 + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - Very High Risk (RM5x5 S:4 L:4) + + + + + + Risk Concepts - JSON-LD serialiation + + + + accepted + 0.31,xsd:decimal + High Risk (RM7x7 S:3 L:5) 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - accepted + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High Harshvardhan J. Pandit - 0.64,xsd:decimal - + - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - + + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + Harshvardhan J. Pandit + - Very High Risk (RM7x7 S:4 L:7) - Harshvardhan J. Pandit - 0.57,xsd:decimal 2022-08-17 - accepted + Low Risk (RM7x7 S:2 L:4) + 0.16,xsd:decimal - + + 2022-08-17 + 0.14,xsd:decimal + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - 2022-08-17 + Harshvardhan J. Pandit accepted - 0.12,xsd:decimal - Harshvardhan J. Pandit - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - accepted - Harshvardhan J. Pandit - Low Risk (RM5x5 S:1 L:4) - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.36,xsd:decimal - 0.16,xsd:decimal + Harshvardhan J. Pandit + Moderate Risk (RM5x5 S:3 L:3) + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + 2022-08-17 - - + + + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + 0.33,xsd:decimal + - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + 2022-08-17 accepted + Moderate Risk (RM3x3 S:1 L:3) Harshvardhan J. Pandit - Moderate Risk (RM5x5 S:3 L:2) - 2022-08-17 - 0.24,xsd:decimal - - + - - Low Risk (RM7x7 S:4 L:2) + - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - 0.16,xsd:decimal - 2022-08-17 + Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:7 L:5) + 0.71,xsd:decimal accepted - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + 2022-08-17 - + + + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + accepted + Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - 0.16,xsd:decimal 2022-08-17 - Low Risk (RM7x7 S:2 L:4) - - accepted - Harshvardhan J. Pandit + 0.06,xsd:decimal - - Risk Concepts - N3 serialiation - - - - - - - - Moderate Risk (RM5x5 S:4 L:2) - 0.32,xsd:decimal - accepted - Harshvardhan J. Pandit - 2022-08-17 + + 0.43,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + Harshvardhan J. Pandit + accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - + 2022-08-17 + Very High Risk (RM7x7 S:3 L:7) + - + accepted - Harshvardhan J. Pandit + 0.12,xsd:decimal + 2022-08-17 - 0.80,xsd:decimal - 2022-08-17 + Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 2022-08-17 - 0.24,xsd:decimal + - accepted - Moderate Risk (RM5x5 S:2 L:3) - + Moderate Risk (RM7x7 S:5 L:3) + + 0.31,xsd:decimal Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - - 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + accepted + + + + Extremely Low Risk (RM7x7 S:2 L:2) + accepted - Moderate Risk (RM7x7 S:5 L:3) + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.08,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 0.31,xsd:decimal - accepted Harshvardhan J. Pandit - - - - - - Examples for Data Privacy Vocabulary - - - + + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + + + Harshvardhan J. Pandit 2022-08-17 - 0.49,xsd:decimal + accepted + 0.64,xsd:decimal - accepted + Very High Risk (RM5x5 S:4 L:4) + + + + Moderate Risk (RM3x3 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - Very High Risk (RM7x7 S:4 L:6) Harshvardhan J. Pandit - + + accepted + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + 2022-08-17 + 0.44,xsd:decimal + - + + 2022-08-17 + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + 0.51,xsd:decimal - accepted Harshvardhan J. Pandit - 0.18,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - Low Risk (RM7x7 S:3 L:3) + accepted - - 0.16,xsd:decimal - 2022-08-17 - Low Risk (RM5x5 S:4 L:1) - + - accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Very High Risk (RM5x5 S:5 L:4) Harshvardhan J. Pandit + accepted + 0.80,xsd:decimal + 2022-08-17 + - + + 0.22,xsd:decimal - 2022-08-17 - - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - 0.99,xsd:decimal - Very High Risk (RM5x5 S:5 L:5) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low Harshvardhan J. Pandit - - - + accepted + Low Risk (RM3x3 S:2 L:1) 2022-08-17 + + + + Harshvardhan J. Pandit + High Risk (RM7x7 S:6 L:3) accepted - 0.29,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - Moderate Risk (RM7x7 S:2 L:7) - + - Harshvardhan J. Pandit + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.37,xsd:decimal - - - Risk Concepts - Turtle serialiation + + + - + + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High Harshvardhan J. Pandit - Moderate Risk (RM7x7 S:2 L:6) + 0.99,xsd:decimal + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate 2022-08-17 + + High Risk (RM3x3 S:3 L:3) + + + + 2022-08-17 + + + + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:6 L:2) 0.24,xsd:decimal accepted - - - accepted - Harshvardhan J. Pandit + - 0.49,xsd:decimal - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Harshvardhan J. Pandit + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High 2022-08-17 + High Risk (RM7x7 S:4 L:5) + + 0.41,xsd:decimal - - + + + + Risk Concepts - N3 serialiation + + + + + + - accepted Harshvardhan J. Pandit + 0.80,xsd:decimal - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.16,xsd:decimal + accepted 2022-08-17 + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - 0.32,xsd:decimal + + + + + Risk Concepts - RDF/XML serialiation + + + + + + Low Risk (RM5x5 S:4 L:1) 2022-08-17 - - accepted - Moderate Risk (RM5x5 S:2 L:4) Harshvardhan J. Pandit + 0.16,xsd:decimal + accepted + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - + + Harshvardhan J. Pandit + accepted + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + 0.24,xsd:decimal - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.04,xsd:decimal + Moderate Risk (RM5x5 S:2 L:3) + + + + + High Risk (RM7x7 S:4 L:4) + 0.33,xsd:decimal + + + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High accepted Harshvardhan J. Pandit + 2022-08-17 - - 0.11,xsd:decimal - + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Harshvardhan J. Pandit + accepted 2022-08-17 - Low Risk (RM3x3 S:1 L:1) + 0.86,xsd:decimal - accepted + Extremely High Risk (RM7x7 S:7 L:6) + + + + Very High Risk (RM5x5 S:5 L:5) + + + + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + 2022-08-17 + 0.99,xsd:decimal Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - + accepted + - + Harshvardhan J. Pandit + accepted - Extremely Low Risk (RM7x7 S:4 L:1) 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + 0.06,xsd:decimal - accepted - 0.08,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:3 L:1) - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + + 0.40,xsd:decimal + Harshvardhan J. Pandit + + + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + accepted + 2022-08-17 + High Risk (RM5x5 S:5 L:2) + + + + Very High Risk (RM7x7 S:4 L:6) + accepted + 0.49,xsd:decimal + + + Harshvardhan J. Pandit + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + + - 0.71,xsd:decimal + 0.08,xsd:decimal + accepted 2022-08-17 - Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:4 L:1) - - - - - Risk Concepts - JSON-LD serialiation - + + + Risk Concepts - HTML serialiation + + + diff --git a/2.1-dev/risk/modules/risk_matrix.csv b/2.1-dev/risk/modules/risk_matrix.csv index b2f702db1..f759f29e2 100644 --- a/2.1-dev/risk/modules/risk_matrix.csv +++ b/2.1-dev/risk/modules/risk_matrix.csv @@ -1,87 +1,87 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -RM3x3S1L1,class,https://w3id.org/dpv/risk#RM3x3S1L1,Low Risk (RM3x3 S:1 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S1L2,class,https://w3id.org/dpv/risk#RM3x3S1L2,Low Risk (RM3x3 S:1 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S1L3,class,https://w3id.org/dpv/risk#RM3x3S1L3,Moderate Risk (RM3x3 S:1 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S2L1,class,https://w3id.org/dpv/risk#RM3x3S2L1,Low Risk (RM3x3 S:2 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S2L2,class,https://w3id.org/dpv/risk#RM3x3S2L2,Moderate Risk (RM3x3 S:2 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S2L3,class,https://w3id.org/dpv/risk#RM3x3S2L3,High Risk (RM3x3 S:2 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S3L1,class,https://w3id.org/dpv/risk#RM3x3S3L1,Moderate Risk (RM3x3 S:3 L:1),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S3L2,class,https://w3id.org/dpv/risk#RM3x3S3L2,High Risk (RM3x3 S:3 L:2),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S3L3,class,https://w3id.org/dpv/risk#RM3x3S3L3,High Risk (RM3x3 S:3 L:3),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L1,class,https://w3id.org/dpv/risk#RM5x5S1L1,Very Low Risk (RM5x5 S:1 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L2,class,https://w3id.org/dpv/risk#RM5x5S1L2,Very Low Risk (RM5x5 S:1 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L3,class,https://w3id.org/dpv/risk#RM5x5S1L3,Very Low Risk (RM5x5 S:1 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L4,class,https://w3id.org/dpv/risk#RM5x5S1L4,Low Risk (RM5x5 S:1 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L5,class,https://w3id.org/dpv/risk#RM5x5S1L5,Low Risk (RM5x5 S:1 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L1,class,https://w3id.org/dpv/risk#RM5x5S2L1,Very Low Risk (RM5x5 S:2 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L2,class,https://w3id.org/dpv/risk#RM5x5S2L2,Low Risk (RM5x5 S:2 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L3,class,https://w3id.org/dpv/risk#RM5x5S2L3,Moderate Risk (RM5x5 S:2 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L4,class,https://w3id.org/dpv/risk#RM5x5S2L4,Moderate Risk (RM5x5 S:2 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L5,class,https://w3id.org/dpv/risk#RM5x5S2L5,High Risk (RM5x5 S:2 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L1,class,https://w3id.org/dpv/risk#RM5x5S3L1,Very Low Risk (RM5x5 S:3 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L2,class,https://w3id.org/dpv/risk#RM5x5S3L2,Moderate Risk (RM5x5 S:3 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L3,class,https://w3id.org/dpv/risk#RM5x5S3L3,Moderate Risk (RM5x5 S:3 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L4,class,https://w3id.org/dpv/risk#RM5x5S3L4,High Risk (RM5x5 S:3 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L5,class,https://w3id.org/dpv/risk#RM5x5S3L5,Very High Risk (RM5x5 S:3 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L1,class,https://w3id.org/dpv/risk#RM5x5S4L1,Low Risk (RM5x5 S:4 L:1),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L2,class,https://w3id.org/dpv/risk#RM5x5S4L2,Moderate Risk (RM5x5 S:4 L:2),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L3,class,https://w3id.org/dpv/risk#RM5x5S4L3,High Risk (RM5x5 S:4 L:3),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L4,class,https://w3id.org/dpv/risk#RM5x5S4L4,Very High Risk (RM5x5 S:4 L:4),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L5,class,https://w3id.org/dpv/risk#RM5x5S4L5,Very High Risk (RM5x5 S:4 L:5),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L1,class,https://w3id.org/dpv/risk#RM5x5S5L1,Low Risk (RM5x5 S:5 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L2,class,https://w3id.org/dpv/risk#RM5x5S5L2,High Risk (RM5x5 S:5 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L3,class,https://w3id.org/dpv/risk#RM5x5S5L3,High Risk (RM5x5 S:5 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L4,class,https://w3id.org/dpv/risk#RM5x5S5L4,Very High Risk (RM5x5 S:5 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L5,class,https://w3id.org/dpv/risk#RM5x5S5L5,Very High Risk (RM5x5 S:5 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L1,class,https://w3id.org/dpv/risk#RM7x7S1L1,Extremely Low Risk (RM7x7 S:1 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L2,class,https://w3id.org/dpv/risk#RM7x7S1L2,Extremely Low Risk (RM7x7 S:1 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L3,class,https://w3id.org/dpv/risk#RM7x7S1L3,Extremely Low Risk (RM7x7 S:1 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L4,class,https://w3id.org/dpv/risk#RM7x7S1L4,Very Low Risk (RM7x7 S:1 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L5,class,https://w3id.org/dpv/risk#RM7x7S1L5,Very Low Risk (RM7x7 S:1 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L6,class,https://w3id.org/dpv/risk#RM7x7S1L6,Very Low Risk (RM7x7 S:1 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L7,class,https://w3id.org/dpv/risk#RM7x7S1L7,Low Risk (RM7x7 S:1 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L1,class,https://w3id.org/dpv/risk#RM7x7S2L1,Extremely Low Risk (RM7x7 S:2 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L2,class,https://w3id.org/dpv/risk#RM7x7S2L2,Extremely Low Risk (RM7x7 S:2 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L3,class,https://w3id.org/dpv/risk#RM7x7S2L3,Very Low Risk (RM7x7 S:2 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L4,class,https://w3id.org/dpv/risk#RM7x7S2L4,Low Risk (RM7x7 S:2 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L5,class,https://w3id.org/dpv/risk#RM7x7S2L5,Low Risk (RM7x7 S:2 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L6,class,https://w3id.org/dpv/risk#RM7x7S2L6,Moderate Risk (RM7x7 S:2 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L7,class,https://w3id.org/dpv/risk#RM7x7S2L7,Moderate Risk (RM7x7 S:2 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L1,class,https://w3id.org/dpv/risk#RM7x7S3L1,Extremely Low Risk (RM7x7 S:3 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L2,class,https://w3id.org/dpv/risk#RM7x7S3L2,Very Low Risk (RM7x7 S:3 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L3,class,https://w3id.org/dpv/risk#RM7x7S3L3,Low Risk (RM7x7 S:3 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L4,class,https://w3id.org/dpv/risk#RM7x7S3L4,Moderate Risk (RM7x7 S:3 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L5,class,https://w3id.org/dpv/risk#RM7x7S3L5,High Risk (RM7x7 S:3 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L6,class,https://w3id.org/dpv/risk#RM7x7S3L6,High Risk (RM7x7 S:3 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L7,class,https://w3id.org/dpv/risk#RM7x7S3L7,Very High Risk (RM7x7 S:3 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L1,class,https://w3id.org/dpv/risk#RM7x7S4L1,Extremely Low Risk (RM7x7 S:4 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L2,class,https://w3id.org/dpv/risk#RM7x7S4L2,Low Risk (RM7x7 S:4 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L3,class,https://w3id.org/dpv/risk#RM7x7S4L3,Moderate Risk (RM7x7 S:4 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L4,class,https://w3id.org/dpv/risk#RM7x7S4L4,High Risk (RM7x7 S:4 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L5,class,https://w3id.org/dpv/risk#RM7x7S4L5,High Risk (RM7x7 S:4 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L6,class,https://w3id.org/dpv/risk#RM7x7S4L6,Very High Risk (RM7x7 S:4 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L7,class,https://w3id.org/dpv/risk#RM7x7S4L7,Very High Risk (RM7x7 S:4 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L1,class,https://w3id.org/dpv/risk#RM7x7S5L1,Very Low Risk (RM7x7 S:5 L:1),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L2,class,https://w3id.org/dpv/risk#RM7x7S5L2,Low Risk (RM7x7 S:5 L:2),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L3,class,https://w3id.org/dpv/risk#RM7x7S5L3,Moderate Risk (RM7x7 S:5 L:3),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L4,class,https://w3id.org/dpv/risk#RM7x7S5L4,High Risk (RM7x7 S:5 L:4),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L5,class,https://w3id.org/dpv/risk#RM7x7S5L5,Very High Risk (RM7x7 S:5 L:5),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L6,class,https://w3id.org/dpv/risk#RM7x7S5L6,Extremely High Risk (RM7x7 S:5 L:6),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L7,class,https://w3id.org/dpv/risk#RM7x7S5L7,Extremely High Risk (RM7x7 S:5 L:7),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L1,class,https://w3id.org/dpv/risk#RM7x7S6L1,Very Low Risk (RM7x7 S:6 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L2,class,https://w3id.org/dpv/risk#RM7x7S6L2,Moderate Risk (RM7x7 S:6 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L3,class,https://w3id.org/dpv/risk#RM7x7S6L3,High Risk (RM7x7 S:6 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L4,class,https://w3id.org/dpv/risk#RM7x7S6L4,Very High Risk (RM7x7 S:6 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L5,class,https://w3id.org/dpv/risk#RM7x7S6L5,Very High Risk (RM7x7 S:6 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L6,class,https://w3id.org/dpv/risk#RM7x7S6L6,Extremely High Risk (RM7x7 S:6 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L7,class,https://w3id.org/dpv/risk#RM7x7S6L7,Extremely High Risk (RM7x7 S:6 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L1,class,https://w3id.org/dpv/risk#RM7x7S7L1,Low Risk (RM7x7 S:7 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L2,class,https://w3id.org/dpv/risk#RM7x7S7L2,Moderate Risk (RM7x7 S:7 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L3,class,https://w3id.org/dpv/risk#RM7x7S7L3,High Risk (RM7x7 S:7 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L4,class,https://w3id.org/dpv/risk#RM7x7S7L4,Very High Risk (RM7x7 S:7 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L5,class,https://w3id.org/dpv/risk#RM7x7S7L5,Extremely High Risk (RM7x7 S:7 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L6,class,https://w3id.org/dpv/risk#RM7x7S7L6,Extremely High Risk (RM7x7 S:7 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L7,class,https://w3id.org/dpv/risk#RM7x7S7L7,Extremely High Risk (RM7x7 S:7 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk -RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk -RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +RM3x3S1L1,class,https://w3id.org/dpv/risk#RM3x3S1L1,Low Risk (RM3x3 S:1 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S1L2,class,https://w3id.org/dpv/risk#RM3x3S1L2,Low Risk (RM3x3 S:1 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S1L3,class,https://w3id.org/dpv/risk#RM3x3S1L3,Moderate Risk (RM3x3 S:1 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S2L1,class,https://w3id.org/dpv/risk#RM3x3S2L1,Low Risk (RM3x3 S:2 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S2L2,class,https://w3id.org/dpv/risk#RM3x3S2L2,Moderate Risk (RM3x3 S:2 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S2L3,class,https://w3id.org/dpv/risk#RM3x3S2L3,High Risk (RM3x3 S:2 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S3L1,class,https://w3id.org/dpv/risk#RM3x3S3L1,Moderate Risk (RM3x3 S:3 L:1),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S3L2,class,https://w3id.org/dpv/risk#RM3x3S3L2,High Risk (RM3x3 S:3 L:2),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S3L3,class,https://w3id.org/dpv/risk#RM3x3S3L3,High Risk (RM3x3 S:3 L:3),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L1,class,https://w3id.org/dpv/risk#RM5x5S1L1,Very Low Risk (RM5x5 S:1 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L2,class,https://w3id.org/dpv/risk#RM5x5S1L2,Very Low Risk (RM5x5 S:1 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L3,class,https://w3id.org/dpv/risk#RM5x5S1L3,Very Low Risk (RM5x5 S:1 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L4,class,https://w3id.org/dpv/risk#RM5x5S1L4,Low Risk (RM5x5 S:1 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L5,class,https://w3id.org/dpv/risk#RM5x5S1L5,Low Risk (RM5x5 S:1 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L1,class,https://w3id.org/dpv/risk#RM5x5S2L1,Very Low Risk (RM5x5 S:2 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L2,class,https://w3id.org/dpv/risk#RM5x5S2L2,Low Risk (RM5x5 S:2 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L3,class,https://w3id.org/dpv/risk#RM5x5S2L3,Moderate Risk (RM5x5 S:2 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L4,class,https://w3id.org/dpv/risk#RM5x5S2L4,Moderate Risk (RM5x5 S:2 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L5,class,https://w3id.org/dpv/risk#RM5x5S2L5,High Risk (RM5x5 S:2 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L1,class,https://w3id.org/dpv/risk#RM5x5S3L1,Very Low Risk (RM5x5 S:3 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L2,class,https://w3id.org/dpv/risk#RM5x5S3L2,Moderate Risk (RM5x5 S:3 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L3,class,https://w3id.org/dpv/risk#RM5x5S3L3,Moderate Risk (RM5x5 S:3 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L4,class,https://w3id.org/dpv/risk#RM5x5S3L4,High Risk (RM5x5 S:3 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L5,class,https://w3id.org/dpv/risk#RM5x5S3L5,Very High Risk (RM5x5 S:3 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L1,class,https://w3id.org/dpv/risk#RM5x5S4L1,Low Risk (RM5x5 S:4 L:1),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L2,class,https://w3id.org/dpv/risk#RM5x5S4L2,Moderate Risk (RM5x5 S:4 L:2),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L3,class,https://w3id.org/dpv/risk#RM5x5S4L3,High Risk (RM5x5 S:4 L:3),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L4,class,https://w3id.org/dpv/risk#RM5x5S4L4,Very High Risk (RM5x5 S:4 L:4),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L5,class,https://w3id.org/dpv/risk#RM5x5S4L5,Very High Risk (RM5x5 S:4 L:5),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L1,class,https://w3id.org/dpv/risk#RM5x5S5L1,Low Risk (RM5x5 S:5 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L2,class,https://w3id.org/dpv/risk#RM5x5S5L2,High Risk (RM5x5 S:5 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L3,class,https://w3id.org/dpv/risk#RM5x5S5L3,High Risk (RM5x5 S:5 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L4,class,https://w3id.org/dpv/risk#RM5x5S5L4,Very High Risk (RM5x5 S:5 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L5,class,https://w3id.org/dpv/risk#RM5x5S5L5,Very High Risk (RM5x5 S:5 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L1,class,https://w3id.org/dpv/risk#RM7x7S1L1,Extremely Low Risk (RM7x7 S:1 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L2,class,https://w3id.org/dpv/risk#RM7x7S1L2,Extremely Low Risk (RM7x7 S:1 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L3,class,https://w3id.org/dpv/risk#RM7x7S1L3,Extremely Low Risk (RM7x7 S:1 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L4,class,https://w3id.org/dpv/risk#RM7x7S1L4,Very Low Risk (RM7x7 S:1 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L5,class,https://w3id.org/dpv/risk#RM7x7S1L5,Very Low Risk (RM7x7 S:1 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L6,class,https://w3id.org/dpv/risk#RM7x7S1L6,Very Low Risk (RM7x7 S:1 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L7,class,https://w3id.org/dpv/risk#RM7x7S1L7,Low Risk (RM7x7 S:1 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L1,class,https://w3id.org/dpv/risk#RM7x7S2L1,Extremely Low Risk (RM7x7 S:2 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L2,class,https://w3id.org/dpv/risk#RM7x7S2L2,Extremely Low Risk (RM7x7 S:2 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L3,class,https://w3id.org/dpv/risk#RM7x7S2L3,Very Low Risk (RM7x7 S:2 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L4,class,https://w3id.org/dpv/risk#RM7x7S2L4,Low Risk (RM7x7 S:2 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L5,class,https://w3id.org/dpv/risk#RM7x7S2L5,Low Risk (RM7x7 S:2 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L6,class,https://w3id.org/dpv/risk#RM7x7S2L6,Moderate Risk (RM7x7 S:2 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L7,class,https://w3id.org/dpv/risk#RM7x7S2L7,Moderate Risk (RM7x7 S:2 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L1,class,https://w3id.org/dpv/risk#RM7x7S3L1,Extremely Low Risk (RM7x7 S:3 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L2,class,https://w3id.org/dpv/risk#RM7x7S3L2,Very Low Risk (RM7x7 S:3 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L3,class,https://w3id.org/dpv/risk#RM7x7S3L3,Low Risk (RM7x7 S:3 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L4,class,https://w3id.org/dpv/risk#RM7x7S3L4,Moderate Risk (RM7x7 S:3 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L5,class,https://w3id.org/dpv/risk#RM7x7S3L5,High Risk (RM7x7 S:3 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L6,class,https://w3id.org/dpv/risk#RM7x7S3L6,High Risk (RM7x7 S:3 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L7,class,https://w3id.org/dpv/risk#RM7x7S3L7,Very High Risk (RM7x7 S:3 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L1,class,https://w3id.org/dpv/risk#RM7x7S4L1,Extremely Low Risk (RM7x7 S:4 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L2,class,https://w3id.org/dpv/risk#RM7x7S4L2,Low Risk (RM7x7 S:4 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L3,class,https://w3id.org/dpv/risk#RM7x7S4L3,Moderate Risk (RM7x7 S:4 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L4,class,https://w3id.org/dpv/risk#RM7x7S4L4,High Risk (RM7x7 S:4 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L5,class,https://w3id.org/dpv/risk#RM7x7S4L5,High Risk (RM7x7 S:4 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L6,class,https://w3id.org/dpv/risk#RM7x7S4L6,Very High Risk (RM7x7 S:4 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L7,class,https://w3id.org/dpv/risk#RM7x7S4L7,Very High Risk (RM7x7 S:4 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L1,class,https://w3id.org/dpv/risk#RM7x7S5L1,Very Low Risk (RM7x7 S:5 L:1),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L2,class,https://w3id.org/dpv/risk#RM7x7S5L2,Low Risk (RM7x7 S:5 L:2),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L3,class,https://w3id.org/dpv/risk#RM7x7S5L3,Moderate Risk (RM7x7 S:5 L:3),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L4,class,https://w3id.org/dpv/risk#RM7x7S5L4,High Risk (RM7x7 S:5 L:4),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L5,class,https://w3id.org/dpv/risk#RM7x7S5L5,Very High Risk (RM7x7 S:5 L:5),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L6,class,https://w3id.org/dpv/risk#RM7x7S5L6,Extremely High Risk (RM7x7 S:5 L:6),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L7,class,https://w3id.org/dpv/risk#RM7x7S5L7,Extremely High Risk (RM7x7 S:5 L:7),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L1,class,https://w3id.org/dpv/risk#RM7x7S6L1,Very Low Risk (RM7x7 S:6 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L2,class,https://w3id.org/dpv/risk#RM7x7S6L2,Moderate Risk (RM7x7 S:6 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L3,class,https://w3id.org/dpv/risk#RM7x7S6L3,High Risk (RM7x7 S:6 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L4,class,https://w3id.org/dpv/risk#RM7x7S6L4,Very High Risk (RM7x7 S:6 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L5,class,https://w3id.org/dpv/risk#RM7x7S6L5,Very High Risk (RM7x7 S:6 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L6,class,https://w3id.org/dpv/risk#RM7x7S6L6,Extremely High Risk (RM7x7 S:6 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L7,class,https://w3id.org/dpv/risk#RM7x7S6L7,Extremely High Risk (RM7x7 S:6 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L1,class,https://w3id.org/dpv/risk#RM7x7S7L1,Low Risk (RM7x7 S:7 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L2,class,https://w3id.org/dpv/risk#RM7x7S7L2,Moderate Risk (RM7x7 S:7 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L3,class,https://w3id.org/dpv/risk#RM7x7S7L3,High Risk (RM7x7 S:7 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L4,class,https://w3id.org/dpv/risk#RM7x7S7L4,Very High Risk (RM7x7 S:7 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L5,class,https://w3id.org/dpv/risk#RM7x7S7L5,Extremely High Risk (RM7x7 S:7 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L6,class,https://w3id.org/dpv/risk#RM7x7S7L6,Extremely High Risk (RM7x7 S:7 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L7,class,https://w3id.org/dpv/risk#RM7x7S7L7,Extremely High Risk (RM7x7 S:7 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk +RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk +RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_matrix.jsonld b/2.1-dev/risk/modules/risk_matrix.jsonld index 5b4bf19db..9f9e26012 100644 --- a/2.1-dev/risk/modules/risk_matrix.jsonld +++ b/2.1-dev/risk/modules/risk_matrix.jsonld @@ -1,6 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19,7 +19,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -41,7 +41,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -52,12 +52,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -76,7 +76,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -98,7 +98,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -109,12 +109,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -131,6 +131,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -144,13 +149,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -161,12 +166,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -185,7 +190,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -201,13 +206,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -218,12 +223,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -242,7 +247,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -264,7 +269,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -275,12 +280,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -299,7 +304,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -315,13 +320,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -332,12 +337,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -356,7 +361,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -378,7 +383,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -389,12 +394,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -413,7 +418,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -429,13 +434,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -446,12 +451,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -470,7 +475,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -486,13 +491,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -503,12 +508,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -527,7 +532,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -543,13 +548,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -560,12 +565,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -582,6 +618,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -595,13 +636,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -612,43 +653,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" - } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -665,11 +675,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.44,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -683,13 +688,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -700,33 +705,33 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Risk Concepts - N3 serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -736,7 +741,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -755,7 +760,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -771,13 +776,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -788,12 +793,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -812,7 +817,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -834,7 +839,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -845,12 +850,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -869,7 +874,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -885,13 +890,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -902,12 +907,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -926,7 +931,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -942,13 +947,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -959,12 +964,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -983,7 +988,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -999,13 +1004,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1016,12 +1021,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1040,7 +1045,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1056,13 +1061,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1073,12 +1078,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1097,7 +1102,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1113,13 +1118,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1130,12 +1135,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1154,7 +1159,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.36,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1170,13 +1175,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1187,12 +1192,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1211,7 +1216,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1233,7 +1238,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1244,12 +1249,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1268,7 +1273,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1284,13 +1289,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1301,12 +1306,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1325,7 +1330,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1341,13 +1346,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1358,12 +1363,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1382,7 +1387,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1404,7 +1409,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1415,43 +1420,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1470,7 +1444,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1486,13 +1460,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1503,12 +1477,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1527,7 +1501,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1549,7 +1523,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1560,12 +1534,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1582,6 +1556,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1595,13 +1574,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1612,12 +1591,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1636,7 +1615,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1652,13 +1631,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1669,12 +1648,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1693,7 +1672,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1715,7 +1694,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1726,12 +1705,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1750,7 +1729,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1772,7 +1751,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1783,12 +1762,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1807,7 +1786,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1829,7 +1808,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1840,12 +1819,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1864,7 +1843,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1886,7 +1865,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1897,69 +1876,105 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.12,xsd:decimal" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1978,7 +1993,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2000,7 +2015,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2011,12 +2026,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2035,7 +2050,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.11,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2051,13 +2066,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2068,43 +2083,95 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Matrix 7x7" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2123,7 +2190,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2145,7 +2212,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2156,12 +2223,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2180,7 +2247,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2196,13 +2263,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2213,12 +2280,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2237,7 +2304,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2253,13 +2320,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2270,12 +2337,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2310,13 +2377,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2327,12 +2394,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2351,7 +2418,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2367,13 +2434,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2384,12 +2451,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2408,7 +2475,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2424,13 +2491,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2441,12 +2508,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2465,7 +2532,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2487,7 +2554,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2498,12 +2565,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2522,7 +2589,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2538,13 +2605,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2555,12 +2622,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2579,7 +2646,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2595,13 +2662,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2612,12 +2679,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2636,7 +2703,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2652,13 +2719,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2669,12 +2736,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2693,7 +2760,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2709,13 +2776,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2726,12 +2793,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2750,7 +2848,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2766,13 +2864,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2783,12 +2881,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2807,7 +2905,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2823,13 +2921,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2840,12 +2938,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2862,11 +2960,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2880,13 +2973,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2897,12 +2990,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2921,7 +3014,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2943,7 +3036,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2954,12 +3047,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2978,7 +3071,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2994,13 +3087,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3011,12 +3104,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3035,7 +3128,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3057,7 +3150,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3068,12 +3161,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3092,7 +3191,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3108,13 +3207,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3125,12 +3224,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3149,7 +3279,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3165,13 +3295,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3182,12 +3312,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3206,7 +3336,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3222,13 +3352,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3239,12 +3369,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3263,7 +3393,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3279,13 +3409,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3296,28 +3426,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3326,170 +3444,51 @@ ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "2022-08-14" + "@value": "0.43,xsd:decimal" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, - { - "@id": "https://w3id.org/dpv" - } - ], - "http://xmlns.com/foaf/0.1/logo": [ - { - "@id": "https://w3id.org/dpv/media/logo.png" - } - ], - "https://schema.org/version": [ - { - "@value": "2.1-dev" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3508,7 +3507,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3530,7 +3529,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3541,12 +3540,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3565,7 +3564,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3581,13 +3580,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3598,12 +3597,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3622,7 +3621,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3644,7 +3643,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3655,12 +3654,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3679,7 +3678,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3701,7 +3700,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3712,12 +3711,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3736,7 +3735,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3758,7 +3757,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3769,12 +3768,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3793,7 +3792,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3815,7 +3814,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3826,12 +3825,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3850,7 +3849,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3872,7 +3871,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3883,12 +3882,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3907,7 +3906,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3923,13 +3922,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3940,12 +3939,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3964,7 +3963,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3980,13 +3979,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3997,12 +3996,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4021,7 +4020,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4043,7 +4042,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4054,16 +4053,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } ], "http://purl.org/dc/terms/contributor": [ { @@ -4072,114 +4083,170 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/creator": [ { - "@value": "0.12,xsd:decimal" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "2024-07-13" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Risk Concepts" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/ontology/bibo/doi": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "10.5281/zenodo.12505841" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/ontology/bibo/status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@value": "0.73,xsd:decimal" + "@value": "risk" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "accepted" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "2.1-dev" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4198,7 +4265,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4214,13 +4281,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4231,12 +4298,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4255,7 +4322,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4271,13 +4338,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4288,12 +4355,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4312,7 +4379,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4334,7 +4401,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4345,12 +4412,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4369,7 +4436,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4391,7 +4458,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4402,12 +4469,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4426,7 +4493,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4442,13 +4509,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4459,12 +4526,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4483,7 +4550,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4505,7 +4572,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4516,12 +4583,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4540,7 +4607,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4556,13 +4623,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4573,12 +4640,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4597,7 +4664,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4619,7 +4686,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4630,12 +4697,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4654,7 +4721,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4670,13 +4737,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4687,12 +4754,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4711,7 +4778,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4727,13 +4794,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4744,74 +4811,69 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@value": "0.43,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4830,7 +4892,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4852,7 +4914,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4863,12 +4925,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4887,7 +4949,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4903,13 +4965,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4920,12 +4982,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4944,7 +5006,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4966,7 +5028,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4977,12 +5039,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5001,7 +5063,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5023,7 +5085,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5034,12 +5096,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5058,7 +5120,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5074,13 +5136,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5091,12 +5153,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5115,7 +5177,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5131,13 +5193,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5148,12 +5210,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5172,7 +5234,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5194,7 +5256,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5205,43 +5267,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5260,7 +5291,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5282,7 +5313,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5293,38 +5324,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] } diff --git a/2.1-dev/risk/modules/risk_matrix.rdf b/2.1-dev/risk/modules/risk_matrix.rdf index dfe78d8d9..50a7f6fa1 100644 --- a/2.1-dev/risk/modules/risk_matrix.rdf +++ b/2.1-dev/risk/modules/risk_matrix.rdf @@ -12,13 +12,13 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + 0.08,xsd:decimal 2022-08-17 accepted @@ -26,233 +26,175 @@ - + - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 0.43,xsd:decimal + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - 0.20,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Harshvardhan J. Pandit - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - - - - - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.64,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 0.06,xsd:decimal + 0.71,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.31,xsd:decimal + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - - 0.99,xsd:decimal + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.24,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - 0.73,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - HTML serialiation + + - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - - 0.29,xsd:decimal + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 0.80,xsd:decimal + 0.32,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit @@ -273,413 +215,396 @@ - + - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal + Low Risk (RM7x7 S:2 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - 0.20,xsd:decimal + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + High Risk (RM7x7 S:4 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 0.12,xsd:decimal + 0.41,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - 0.24,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.37,xsd:decimal + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - 0.71,xsd:decimal + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.12,xsd:decimal + 0.18,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 0.37,xsd:decimal + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - - 0.57,xsd:decimal + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - 0.24,xsd:decimal + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - 0.10,xsd:decimal + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 0.14,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - RDF/XML serialiation - - + - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.99,xsd:decimal + 0.02,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal + Risk Matrix 5x5 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - 0.51,xsd:decimal + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.08,xsd:decimal + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - JSON-LD serialiation - - + - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.02,xsd:decimal + 0.71,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Primer for Data Privacy Vocabulary - - - - + - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - Turtle serialiation + + - Risk Matrix 5x5 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.32,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - 0.61,xsd:decimal + 0.49,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - 0.04,xsd:decimal + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - 0.12,xsd:decimal + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.12,xsd:decimal + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - 0.36,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High 0.49,xsd:decimal 2022-08-17 @@ -688,535 +613,588 @@ - + - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - 0.86,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.08,xsd:decimal + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - - 0.33,xsd:decimal + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - HTML serialiation - - + - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.20,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 0.32,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.40,xsd:decimal + Very Low Risk (RM7x7 S:6 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - 0.10,xsd:decimal + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - 0.31,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - 0.06,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Harshvardhan J. Pandit + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + - Low Risk (RM7x7 S:2 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.20,xsd:decimal + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.36,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Guides for Data Privacy Vocabulary + + + + + + + + Examples for Data Privacy Vocabulary + + + + - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - 0.16,xsd:decimal + 0.57,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - 0.49,xsd:decimal + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Guides for Data Privacy Vocabulary - - - - + - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.16,xsd:decimal + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Primer for Data Privacy Vocabulary + + + + - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.48,xsd:decimal + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - - 0.60,xsd:decimal + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:4 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - 0.41,xsd:decimal + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.61,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:5 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - 0.41,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.24,xsd:decimal + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - 0.86,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - - 0.29,xsd:decimal + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 0.44,xsd:decimal + 0.67,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - JSON-LD serialiation + + - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.51,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Examples for Data Privacy Vocabulary - - - - + - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.16,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 0.18,xsd:decimal + 0.41,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - - - Risk Concepts - N3 serialiation + + + + Risk Concepts - RDF/XML serialiation - + - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 0.40,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - 0.80,xsd:decimal + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + 0.57,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - - 0.57,xsd:decimal + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - - 0.14,xsd:decimal + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit @@ -1237,84 +1215,106 @@ - + - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - 0.08,xsd:decimal + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - N3 serialiation + + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - 0.08,xsd:decimal + 0.43,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - 0.04,xsd:decimal + 0.43,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 0.16,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - 0.48,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit diff --git a/2.1-dev/risk/risk-en.html b/2.1-dev/risk/risk-en.html index d148174cd..c8b42bf5f 100644 --- a/2.1-dev/risk/risk-en.html +++ b/2.1-dev/risk/risk-en.html @@ -1024,7 +1024,7 @@

    Incident

    -

    Incident Status

    +

    Incident Status

    • risk:IncidentStatus: Status associated with an incident @@ -1074,6 +1074,10 @@

      Incident Status

    + +
    +

    Incident Report

    +
    @@ -1247,5858 +1251,923 @@

    Consequences and Impacts

    -

    The RISK extension provides a taxonomy to expand upon the [[DPV]] concepts of dpv:Consequence and dpv:Impact. In [[DPV]], consequence is in general an outcome of an event, while impacts are a specific subset of consequences which affect entities (as compared to systems and technologies). The intent of this distinction is to support regulatory requirements such as impact assessments which are focused on how processes affect entities such as individuals and societal groups.

    -

    Broadly, the taxonomy is based on the following commonly required concepts:

    -
      -
    1. Consequences: -
        -
      1. [=Benefit=]
      2. -
      3. [=Detriment=]
      4. -
      5. [=Damage=]
      6. -
    2. -
    3. Impacts: -
        -
      1. [=MaterialDamage=]
      2. -
      3. [=NonMaterialDamage=]
      4. -
      5. [=Harm=]
      6. -
      7. [=Compensation=]
      8. -
      9. [=Reward=]
      10. -
      11. [=Payment=]
      12. -
      13. [=Fee=]
      14. -
      15. [=Renumeration=]
      16. -
    4. -
    -
      -
    • - risk:Benefit: Impact(s) that acts as or causes benefits - go to full definition -
        -
      • - risk:Compensation: Compensation provided (as an impact) - go to full definition -
          -
        • - risk:Fee: Fee provided as compensation (as an impact) - go to full definition - -
        • +

          The RISK extension provides a single unified taxonomy of concepts that can take on the roles of `RiskSource`, `Risk`, `Consequence`, and `Impact` in an use-case. For example, the same concept `DataBreach` can be the the `Risk` in a risk assessment whose impacts are to be determined, or it can be the `Impact` whose causes must be discovered. By providing a single taxonomy, the adopter is free to choose which role the concept plays within their use-case - which offers significant benefits in terms of both extensibility and flexibility, allowing users to tailor the taxonomy to their specific use cases while maintaining a consistent framework.

          +

          The RISK taxonomy's design allows it to be highly and easily extensible as concepts are not required to be strictly categorised as risks or impacts within the DPV specifications itself. This is particularly valuable as the areas of cybersecurity and AI technologies are rapidly evolving landscapes where new risks and risk sources frequently emerge.

          +

          To enable the creation of this taxonomy, the concept `dpv:RiskConcept` acts as the parent or top concept, and `dpv:Risk`, `dpv:Consequence`, `dpv:Impact`, and `risk:RiskSource` are defined as its subclasses. To utilise these concepts in particular roles, the associated relations or properties such as `dpv:hasRisk` and `dpv:hasImpact` are used.

          + + +

          The risk concepts taxonomy is broadly divided into the following categories:

          + + +
          +

          InternalSecurityThreat

          +
          +
          +
          +

          UserRisks

          +
          - -
        -
      • - risk:BusinessImpact: Business impact - go to full definition + risk:HumanErrors: Something that acts as or causes Human Errors + go to full definition
      • - risk:CitizensImpact: Citizens impact - go to full definition + risk:IntentionalMisuse: Intentional Misuse + go to full definition
      • - risk:ComplianceImpact: Compliance impact - go to full definition + risk:Misuse: Something that acts as or causes Misuse + go to full definition
      • +
    +
    +
    +

    ExternalSecurityThreat

    +
    +
    +
    +

    OperationalSecurityRisk

    +
    -
  • - risk:IllegalProcessingData: Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition
  • - risk:InterceptionCommunications: Interception of Communications - go to full definition + risk:DataCorruption: Something that acts as or causes Corruption of Data + go to full definition
  • - risk:MaterialDamage: Impact that acts as or causes material damages - go to full definition - -
  • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
  • - risk:LossCompetitiveAdvantage: Loss of Competitive Advantage - go to full definition + risk:Spoofing: Something that acts as or causes Spoofing + go to full definition
  • - risk:LossControlOverData: Loss of Control over Data - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
  • - risk:LossCustomers: Loss of Customers - go to full definition + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition
  • +
    +
    +
    +

    LegalRisk

    +
    +
    +
    +

    ReputationalRisk

    +
    -
  • - risk:PublicOrderBreach: Public Order Breach - go to full definition + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition
  • - risk:UnauthorisedCodeModification: Unauthorised Code Modification - go to full definition + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition
  • - risk:UnauthorisedSystemModification: Unauthorised System Modification - go to full definition + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition
  • - risk:UnwantedCodeDeletion: Unwanted Code Deletion - go to full definition + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition
  • - risk:UnwantedDataDeletion: Unwanted Data Deletion - go to full definition + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition
  • - risk:Vandalism: Vandalism - go to full definition + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition
  • +
    +
    +
    +

    SocietalRisk

    +
    - -
  • - risk:Detriment: Impact that acts as or causes detriments - go to full definition -
  • +
    +
    +

    IndividualRisk

    +
    +
    +
    +

    EnvironmentalRisk

    +
    +
    +
    +

    FinancialImpact

    +
      +
    • + risk:Benefit: Something that acts as or causes benefits + go to full definition
    • - risk:DetrimentToRecovery: Detriment to Recovery - go to full definition + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition
    • - risk:DistributedDenialServiceAttack: Distributed Denial of Service Attack (DDoS) - go to full definition + risk:Fee: Something that acts as or provides fees e.g. for using a service + go to full definition
    • - risk:EquipmentMalfunction: Equipment Malfunction - go to full definition + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition
    • - risk:ErroneousSystemUse: Erroneous System Use - go to full definition + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
    • - risk:FinancialEquipmentCosts: Financial Equipment Costs - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
    • - risk:FinancialInvestigationCosts: Financial Investigation Costs - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
    • - risk:FinancialPersonnelCosts: Financial Personnel Costs - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition
    • - risk:FinancialRepairCosts: Financial Repair Costs - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
    • -
    • - risk:GovernmentCrisis: Government Crisis - go to full definition +
    +
    +
    + + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    + + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + - -
  • - risk:HumanErrors: Human Errors - go to full definition -
  • -
  • - risk:IdentityDispute: Identity Dispute - go to full definition -
  • -
  • - risk:IncreaseInternalCost: Increase Internal Cost - go to full definition -
  • -
  • - risk:IndustrialCrisis: Industrial Crisis - go to full definition -
  • -
  • - risk:InternalOperationDisruption: Internal Operation Disruption - go to full definition -
  • -
  • - risk:KnownVulnerabilityExploited: Known Vulnerability Exploited - go to full definition -
  • -
  • - risk:LawEnforcementAdverseEffects: Law Enforcement Adverse Effects - go to full definition -
  • -
  • - risk:LossCredibility: Loss of Credibility - go to full definition -
  • -
  • - risk:LossCustomerConfidence: Loss of Customer Confidence - go to full definition -
  • -
  • - risk:LossGoodwill: Loss of Goodwill - go to full definition -
  • -
  • - risk:LossNegotiatingCapacity: Loss of Negotiating Capacity - go to full definition -
  • -
  • - risk:LossOpportunity: Loss of Opportunity - go to full definition -
  • -
  • - risk:LossReputation: Loss of Reputation - go to full definition -
  • -
  • - risk:LossTrust: Loss of Trust - go to full definition -
  • -
  • - risk:MaliciousCodeAttack: Intentional use of software by including or inserting in a system for a harmful purpose - go to full definition -
  • -
  • - risk:MalwareAttack: Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - go to full definition -
  • -
  • - risk:MisinformationDisinformation: Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) - go to full definition - -
  • -
  • - risk:MisuseBreachedInformation: Misuse of Breached Information - go to full definition - -
  • -
  • - risk:OrganisationDisruption: Organisation Disruption - go to full definition - -
  • -
  • - risk:ReplacementCosts: Replacement Costs - go to full definition - -
  • -
  • - risk:RetrievalDeletedData: Retrieval of Deleted Data - go to full definition - -
  • -
  • - risk:RetrievalDiscardedEquipment: Retrieval of Discarded Equipment - go to full definition - -
  • -
  • - risk:ServiceInterruption: Service Interruption - go to full definition - -
  • -
  • - risk:SystemFailure: System Failure - go to full definition - -
  • -
  • - risk:SystemIntrusion: System Intrusion - go to full definition - -
  • -
  • - risk:SystemMalfunction: System Malfunction - go to full definition - -
  • -
  • - risk:ThirdPartyOperationDisruption: Third Party Operation Disruption - go to full definition - -
  • -
  • - risk:UnauthorisedAccesstoPremises: Unauthorised Access to Premises - go to full definition - -
  • -
  • - risk:UnauthorisedCodeAccess: Unauthorised Code Access - go to full definition - -
  • -
  • - risk:UnauthorisedCodeDisclosure: Unauthorised Code Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedDataAccess: Unauthorised Data Access - go to full definition - -
  • -
  • - risk:UnauthorisedDataDisclosure: Unauthorised Data Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedInformationDisclosure: Unauthorised Information Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedResourceUse: Unauthorised Resource Use - go to full definition - -
  • -
  • - risk:UnauthorisedSystemAccess: Unauthorised System Access - go to full definition - -
  • -
  • - risk:UnknownVulnerabilityExploited: Unknown Vulnerability Exploited - go to full definition - -
  • -
  • - risk:UnwantedDisclosureData: Unwanted Disclosure of Data - go to full definition - -
  • -
  • - risk:VulnerabilityCreated: Vulnerability Created - go to full definition - -
  • -
  • - risk:VulnerabilityExploited: Vulnerability Exploited - go to full definition - -
  • - - -
  • - risk:EconomicDisadvantage: Economic Disadvantage - go to full definition - -
  • -
  • - risk:HealthLifeImpact: Health and life impact - go to full definition - -
  • -
  • - risk:ImpactOnDataSubject: Impact on Data Subject - go to full definition - -
  • -
  • - risk:ImpactToRights: Impact to Rights - go to full definition - -
  • -
  • - risk:Misuse: Misuse - go to full definition - -
  • -
  • - risk:PrivacyImpact: Privacy impact - go to full definition - -
  • -
  • - risk:Reidentification: Re-identification - go to full definition - -
  • -
  • - risk:ReputationTrustImpact: Reputation and trust impact - go to full definition - -
  • -
  • - risk:SecurityBreach: Security Breach - go to full definition - -
  • -
  • - risk:SocialDisadvantage: Social Disadvantage - go to full definition - -
  • - -
    - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    - -
      -
    • - risk:RiskMatrix3x3: A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - go to full definition -
        -
      • - risk:RM3x3S1L1: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L2: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L3: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L1: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S2L2: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L3: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L1: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S3L2: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L3: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix5x5: A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - go to full definition -
        -
      • - risk:RM5x5S1L1: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L2: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L3: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L4: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S1L5: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L1: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S2L2: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L3: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L4: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L5: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L1: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S3L2: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L3: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L4: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L5: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L1: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S4L2: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S4L3: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S4L4: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L5: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L1: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S5L2: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L3: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L4: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L5: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix7x7: A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - go to full definition -
        -
      • - risk:RM7x7S1L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L1: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L2: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L3: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S2L4: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L5: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L6: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S2L7: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L1: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S3L2: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S3L3: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S3L4: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L5: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L6: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L7: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L1: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition - -
      • -
      • - risk:RM7x7S4L2: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S4L3: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S4L4: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L5: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L6: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L7: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L1: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S5L2: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S5L3: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S5L4: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S5L5: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L6: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S5L7: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L1: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S6L2: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S6L3: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S6L4: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L5: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L6: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L7: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S7L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S7L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S7L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S7L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      -
    • -
    - -
    - - -
    -

    Vocabulary Index

    -
    -

    Classes

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    Abusive Content Utilisation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAbusiveContentUtilisationPrefixrisk
    LabelAbusive Content Utilisation
    IRIhttps://w3id.org/dpv/risk#AbusiveContentUtilisation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAbusive Content Utilisation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Accidental Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Attack on Private Life

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAttackonPrivateLifePrefixrisk
    LabelAttack on Private Life
    IRIhttps://w3id.org/dpv/risk#AttackonPrivateLife
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAttack on Private Life
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Authorisation Failure

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAuthorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Availability Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Avoid Source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Benefit

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionImpact(s) that acts as or causes benefits
    Date Created2022-03-23
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Blackmail

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBlackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Brute Force Authorisations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBrute Force Authorisations
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business disruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessdisruptionPrefixrisk
    LabelBusiness disruption
    IRIhttps://w3id.org/dpv/risk#Businessdisruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness disruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessImpactPrefixrisk
    LabelBusiness impact
    IRIhttps://w3id.org/dpv/risk#BusinessImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business Performance Impairment

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessPerformanceImpairmentPrefixrisk
    LabelBusiness Performance Impairment
    IRIhttps://w3id.org/dpv/risk#BusinessPerformanceImpairment
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness Performance Impairment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - - - -
    -

    Change Consequence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Change Impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Child Violence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChildViolencePrefixrisk
    LabelChild Violence
    IRIhttps://w3id.org/dpv/risk#ChildViolence
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionChild Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Citizens impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCitizensImpactPrefixrisk
    LabelCitizens impact
    IRIhttps://w3id.org/dpv/risk#CitizensImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCitizens impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Coercion

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCoercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compensation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types risk:Benefit - → dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionCompensation provided (as an impact)
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compliance impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermComplianceImpactPrefixrisk
    LabelCompliance impact
    IRIhttps://w3id.org/dpv/risk#ComplianceImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompliance impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Credentials

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Credentials
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountSecurityPrefixrisk
    LabelCompromise Account Security
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Security
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Confidentiality Breach

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConfidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Confidentiality Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Consequence Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Consequence for Data Subject

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceForDataSubjectPrefixrisk
    LabelConsequence for Data Subject
    IRIhttps://w3id.org/dpv/risk#ConsequenceForDataSubject
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence for Data Subject
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Consequence on Data Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceOnDataSecurityPrefixrisk
    LabelConsequence on Data Security
    IRIhttps://w3id.org/dpv/risk#ConsequenceOnDataSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence on Data Security
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Containment Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Copyright Violation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCopyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - -
    -

    Corruption of Data

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCorruptionDataPrefixrisk
    LabelCorruption of Data
    IRIhttps://w3id.org/dpv/risk#CorruptionData
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCorruption of Data
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Acquisition

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostAcquisitionPrefixrisk
    LabelCost of Acquisition
    IRIhttps://w3id.org/dpv/risk#CostAcquisition
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Acquisition
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Backup

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostBackupPrefixrisk
    LabelCost of Backup
    IRIhttps://w3id.org/dpv/risk#CostBackup
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Backup
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Configuration

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostConfigurationPrefixrisk
    LabelCost of Configuration
    IRIhttps://w3id.org/dpv/risk#CostConfiguration
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Configuration
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Installation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostInstallationPrefixrisk
    LabelCost of Installation
    IRIhttps://w3id.org/dpv/risk#CostInstallation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Installation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Penalties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialPenaltiesPrefixrisk
    LabelCost of Judicial Penalties
    IRIhttps://w3id.org/dpv/risk#CostJudicialPenalties
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Penalties
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Proceedings

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialProceedingsPrefixrisk
    LabelCost of Judicial Proceedings
    IRIhttps://w3id.org/dpv/risk#CostJudicialProceedings
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Proceedings
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Operation Interruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostOperationInterruptionPrefixrisk
    LabelCost of Operation Interruption
    IRIhttps://w3id.org/dpv/risk#CostOperationInterruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Operation Interruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Suspended Operations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostSuspendedOperationsPrefixrisk
    LabelCost of Suspended Operations
    IRIhttps://w3id.org/dpv/risk#CostSuspendedOperations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Suspended Operations
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Cross-Border Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Cryptojacking

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCryptojackingPrefixrisk
    LabelCryptojacking
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Spying

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCyberSpyingPrefixrisk
    LabelCyber Spying
    IRIhttps://w3id.org/dpv/risk#CyberSpying
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCyber Spying
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Stalking

    + + + + + +
    +

    3 Likelihood Levels

    - + - + - + - + - - - - - + - @@ -7109,23 +2178,20 @@

    Cyber Stalking

    - + - - - - + - + @@ -7136,7 +2202,7 @@

    Cyber Stalking

    - @@ -7145,51 +2211,41 @@

    Cyber Stalking

    -
    -

    Damage

    +
    +

    3 Risk Levels

    TermCyberStalking3LikelihoodLevels Prefix risk
    LabelCyber Stalking3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#CyberStalkinghttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionCyber StalkingScale with 3 Likelihood Levels from High to Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7200,7 +2256,7 @@

    Damage

    - + @@ -7213,7 +2269,7 @@

    Damage

    - + @@ -7224,7 +2280,7 @@

    Damage

    - @@ -7233,52 +2289,41 @@

    Damage

    -
    -

    Damage by Third Party

    +
    +

    3 Severity Levels

    TermDamage3RiskLevels Prefix risk
    LabelDamage3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes damagesScale with 3 Risk Levels from High to Low
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7289,23 +2334,20 @@

    Damage by Third Party

    - + - - - - + - + @@ -7316,7 +2358,7 @@

    Damage by Third Party

    - @@ -7325,53 +2367,41 @@

    Damage by Third Party

    -
    -

    Danger to Customers

    +
    +

    5 Likelihood Levels

    TermDamageByThirdParty3SeverityLevels Prefix risk
    LabelDamage by Third Party3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DamageByThirdPartyhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionDamage by Third PartyScale with 3 Severity Levels from High to Low
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7382,23 +2412,20 @@

    Danger to Customers

    - + - - - - + - + @@ -7409,7 +2436,7 @@

    Danger to Customers

    - @@ -7418,53 +2445,41 @@

    Danger to Customers

    -
    -

    Danger to Personnel

    +
    +

    5 Risk Levels

    TermDangertoCustomers5LikelihoodLevels Prefix risk
    LabelDanger to Customers5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DangertoCustomershttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionDanger to CustomersScale with 5 Likelihood Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7475,23 +2490,20 @@

    Danger to Personnel

    - + - - - - + - + @@ -7502,7 +2514,7 @@

    Danger to Personnel

    - @@ -7511,52 +2523,41 @@

    Danger to Personnel

    -
    -

    Data Breach

    +
    +

    5 Severity Levels

    TermDangertoPersonnel5RiskLevels Prefix risk
    LabelDanger to Personnel5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DangertoPersonnelhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDanger to PersonnelScale with 5 Risk Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7567,26 +2568,20 @@

    Data Breach

    - + - - - - - - - + - + @@ -7597,7 +2592,7 @@

    Data Breach

    - @@ -7605,41 +2600,42 @@

    Data Breach

    -
    -

    Deliberate Incident

    + +
    +

    7 Likelihood Levels

    TermDataBreach5SeverityLevels Prefix risk
    LabelData Breach5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionData BreachScale with 5 Severity Levels from Very High to Very Low
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7650,7 +2646,7 @@

    Deliberate Incident

    - + @@ -7663,15 +2659,18 @@

    Deliberate Incident

    - + - + + + + - @@ -7680,52 +2679,41 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    7 Risk Levels

    TermDeliberateIncident7LikelihoodLevels Prefix risk
    LabelDeliberate Incident7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident + dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to deliberate actions of a humanScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7736,23 +2724,20 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + @@ -7763,7 +2748,7 @@

    Denial of Service Attack (DoS)

    - @@ -7772,45 +2757,41 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    +
    +

    7 Severity Levels

    TermDenialServiceAttack7RiskLevels Prefix risk
    LabelDenial of Service Attack (DoS)7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDenial of Service Attack (DoS)Scale with 7 Risk Levels from Extremely High to Extremely Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7821,7 +2802,7 @@

    Detection Control

    - + @@ -7834,15 +2815,18 @@

    Detection Control

    - + - + + + + - @@ -7850,52 +2834,42 @@

    Detection Control

    - -
    -

    Detriment

    +
    +

    Accidental Incident

    TermDetectionControl7SeverityLevels Prefix risk
    LabelDetection Control7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to detect eventScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7906,7 +2880,7 @@

    Detriment

    - + @@ -7919,18 +2893,15 @@

    Detriment

    - + - - - - + - @@ -7939,54 +2910,40 @@

    Detriment

    -
    -

    Detriment to Recovery

    +
    +

    Accidental Misuse

    TermDetrimentAccidentalIncident Prefix risk
    LabelDetrimentAccidental Incident
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes detrimentsIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2022-03-232024-05-19
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -7995,29 +2952,20 @@

    Detriment to Recovery

    - + - - - - + - - - - + - - - - + @@ -8031,55 +2979,40 @@

    Detriment to Recovery

    -
    -

    Discrimination

    +
    +

    Authorisation Failure

    TermDetrimentToRecoveryAccidentalMisuse Prefix risk
    LabelDetriment to RecoveryAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#DetrimentToRecoveryhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDetriment to RecoveryAccidental Misuse
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8088,25 +3021,31 @@

    Discrimination

    - + - + + + + - + - + + + + - + @@ -8121,85 +3060,61 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    None

    TermDiscriminationAuthorisationFailure Prefix risk
    LabelDiscriminationAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDiscriminationSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -8212,54 +3127,42 @@

    Distributed Denial of Service Attack (DDoS)

    - -
    -

    Eavesdropping

    +
    +

    Availability Incident

    TermDistributedDenialServiceAttackAvailabilityBreach Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)None
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDistributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8270,34 +3173,28 @@

    Eavesdropping

    - + - - - - + - + - - - - + - @@ -8306,51 +3203,46 @@

    Eavesdropping

    -
    -

    Economic Disadvantage

    +
    +

    Avoid Source

    TermEavesdroppingAvailabilityIncident Prefix risk
    LabelEavesdroppingAvailability Incident
    IRIhttps://w3id.org/dpv/risk#Eavesdroppinghttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionEavesdroppingIncident where the availability of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -8361,7 +3253,7 @@

    Economic Disadvantage

    - + @@ -8374,18 +3266,18 @@

    Economic Disadvantage

    - + - + - @@ -8393,43 +3285,41 @@

    Economic Disadvantage

    -
    -

    Environmental Incident

    + +
    +

    Benefit

    TermEconomicDisadvantageAvoidSource Prefix risk
    LabelEconomic DisadvantageAvoid Source
    IRIhttps://w3id.org/dpv/risk#EconomicDisadvantagehttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEconomic DisadvantageControl that avoids the risk source
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -8438,7 +3328,7 @@

    Environmental Incident

    - + @@ -8451,15 +3341,21 @@

    Environmental Incident

    - + - - + + + + + + + + - @@ -8468,55 +3364,40 @@

    Environmental Incident

    -
    -

    Environmental Safety Endangerment

    +
    +

    Blackmail

    TermEnvironmentalIncidentBenefit Prefix risk
    LabelEnvironmental IncidentBenefit
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Incident + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to environmental factors outside human controlsSomething that acts as or causes benefits
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8525,7 +3406,7 @@

    Environmental Safety Endangerment

    - + @@ -8543,7 +3424,10 @@

    Environmental Safety Endangerment

    - + + + + @@ -8561,54 +3445,40 @@

    Environmental Safety Endangerment

    -
    -

    Equipment Failure

    +
    +

    Brute Force Authorisations

    TermEnvironmentalSafetyEndangermentBlackmail Prefix risk
    LabelEnvironmental Safety EndangermentBlackmail
    IRIhttps://w3id.org/dpv/risk#EnvironmentalSafetyEndangermenthttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEnvironmental Safety EndangermentSomething that acts as or causes Blackmail
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8617,7 +3487,7 @@

    Equipment Failure

    - + @@ -8626,7 +3496,7 @@

    Equipment Failure

    - + @@ -8635,7 +3505,10 @@

    Equipment Failure

    - + + + + @@ -8653,52 +3526,50 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    + + + + +
    +

    Change Consequence

    TermEquipmentFailureBruteForceAuthorisations Prefix risk
    LabelEquipment FailureBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEquipment FailureSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8709,23 +3580,20 @@

    Equipment Malfunction

    - + - - - - + - + @@ -8736,7 +3604,7 @@

    Equipment Malfunction

    - @@ -8745,52 +3613,46 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Change Impact

    TermEquipmentMalfunctionChangeConsequence Prefix risk
    LabelEquipment MalfunctionChange Consequence
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEquipment MalfunctionControl that changes Consequence
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -8801,23 +3663,20 @@

    Erroneous System Use

    - + - - - - + - + @@ -8828,7 +3687,7 @@

    Erroneous System Use

    - @@ -8837,57 +3696,40 @@

    Erroneous System Use

    - - -
    -

    Extorsion

    +
    +

    Coercion

    TermErroneousSystemUseChangeImpact Prefix risk
    LabelErroneous System UseChange Impact
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionErroneous System UseControl that changes Impact
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8896,7 +3738,7 @@

    Extorsion

    - + @@ -8914,7 +3756,10 @@

    Extorsion

    - + + + + @@ -8932,44 +3777,40 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Compensation

    TermExtorsionCoercion Prefix risk
    LabelExtorsionCoercion
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionExtorsionSomething that acts as or causes Coercion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8978,12 +3819,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -8994,18 +3832,21 @@

    Extremely High Likelihood

    - + - + + + + - + - @@ -9014,44 +3855,40 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    +
    +

    Component Failure

    TermExtremelyHighLikelihoodCompensation Prefix risk
    LabelExtremely High LikelihoodCompensation
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely HighSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9060,11 +3897,11 @@

    Extremely High Risk

    - + - + @@ -9074,20 +3911,14 @@

    Extremely High Risk

    - - - - + - - - - + - @@ -9096,44 +3927,40 @@

    Extremely High Risk

    -
    -

    Extremely High Severity

    +
    +

    Component Malfunction

    TermExtremelyHighRiskComponentFailure Prefix risk
    LabelExtremely High RiskComponent Failure
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Component Failure
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + @@ -9142,11 +3969,11 @@

    Extremely High Severity

    - + - + @@ -9156,20 +3983,14 @@

    Extremely High Severity

    - - - - + - - - - + - @@ -9178,44 +3999,40 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Compromise Account

    TermExtremelyHighSeverityComponentMalfunction Prefix risk
    LabelExtremely High SeverityComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Component Malfunction
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9224,25 +4041,28 @@

    Extremely Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -9251,7 +4071,7 @@

    Extremely Low Likelihood

    - @@ -9260,44 +4080,40 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Compromise Account Credentials

    TermExtremelyLowLikelihoodCompromiseAccount Prefix risk
    LabelExtremely Low LikelihoodCompromise Account
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowSomething that acts as or causes a compromised account that is then used by the compromiser
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9306,25 +4122,28 @@

    Extremely Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -9333,7 +4152,7 @@

    Extremely Low Risk

    - @@ -9342,44 +4161,42 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    +
    +

    Confidentiality Breach

    TermExtremelyLowRiskCompromiseAccountCredentials Prefix risk
    LabelExtremely Low RiskCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowSomething that acts as or causes Account Credentials to be compromised
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9388,25 +4205,28 @@

    Extremely Low Severity

    - + - - - - + - + + + + - + - + + + + @@ -9415,7 +4235,7 @@

    Extremely Low Severity

    - @@ -9423,50 +4243,42 @@

    Extremely Low Severity

    - -
    -

    Fee

    +
    +

    Confidentiality Incident

    TermExtremelyLowSeverityConfidentialityBreach Prefix risk
    LabelExtremely Low SeverityConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Confidentiality Breach
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -9477,34 +4289,28 @@

    Fee

    - + - - - - + - + - - - - + - @@ -9513,52 +4319,45 @@

    Fee

    -
    -

    Financial Equipment Costs

    +
    +

    Consequence Control

    TermFeeConfidentialityIncident Prefix risk
    LabelFeeConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + risk:hasIncident
    DefinitionFee provided as compensation (as an impact)Incident where the confidentiality of information or system has been affected
    Source
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -9569,23 +4368,20 @@

    Financial Equipment Costs

    - + - - - - + - + @@ -9596,7 +4392,7 @@

    Financial Equipment Costs

    - @@ -9605,52 +4401,45 @@

    Financial Equipment Costs

    -
    -

    Financial Investigation Costs

    +
    +

    Containment Control

    TermFinancialEquipmentCostsConsequenceControl Prefix risk
    LabelFinancial Equipment CostsConsequence Control
    IRIhttps://w3id.org/dpv/risk#FinancialEquipmentCostshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Equipment CostsRisk Mitigation Measure that controls the Consequences
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -9661,34 +4450,28 @@

    Financial Investigation Costs

    - + - - - - + - + - - - - + - @@ -9697,54 +4480,40 @@

    Financial Investigation Costs

    -
    -

    Financial Loss

    +
    +

    Copyright Violation

    TermFinancialInvestigationCostsContainmentControl Prefix risk
    LabelFinancial Investigation CostsContainment Control
    IRIhttps://w3id.org/dpv/risk#FinancialInvestigationCostshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Investigation CostsControl to contain event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9753,7 +4522,7 @@

    Financial Loss

    - + @@ -9762,7 +4531,7 @@

    Financial Loss

    - + @@ -9771,7 +4540,10 @@

    Financial Loss

    - + + + + @@ -9786,55 +4558,46 @@

    Financial Loss

    TermFinancialLossCopyrightViolation Prefix risk
    LabelFinancial LossCopyright Violation
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial LossSomething that acts as or causes Copyright Violation
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    + + - -
    -

    Financial Personnel Costs

    +
    +

    Cross-Border Incident

    - + - + - + - + - - - - - + - @@ -9845,34 +4608,28 @@

    Financial Personnel Costs

    - + - - - - + - + - - - - + - @@ -9881,54 +4638,40 @@

    Financial Personnel Costs

    -
    -

    Financial Repair Costs

    +
    +

    Cryptojacking

    TermFinancialPersonnelCostsCrossBorderIncident Prefix risk
    LabelFinancial Personnel CostsCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#FinancialPersonnelCostshttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionFinancial Personnel CostsIncident involving cross-border or multiple jurisdictions
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9937,7 +4680,7 @@

    Financial Repair Costs

    - + @@ -9946,7 +4689,7 @@

    Financial Repair Costs

    - + @@ -9955,7 +4698,10 @@

    Financial Repair Costs

    - + + + + @@ -9973,55 +4719,40 @@

    Financial Repair Costs

    -
    -

    Fraud

    +
    +

    Damage

    TermFinancialRepairCostsCryptojacking Prefix risk
    LabelFinancial Repair CostsCryptojacking
    IRIhttps://w3id.org/dpv/risk#FinancialRepairCostshttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial Repair CostsSomething that acts as or causes Cryptojacking
    SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10030,25 +4761,25 @@

    Fraud

    - + - - - - + - + - + + + + @@ -10066,54 +4797,41 @@

    Fraud

    -
    -

    Government Crisis

    +
    +

    Data Breach

    TermFraudDamage Prefix risk
    LabelFraudDamage
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFraudSomething that acts as or causes Damage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10122,10 +4840,13 @@

    Government Crisis

    - + + + + @@ -10140,7 +4861,10 @@

    Government Crisis

    - + + + + @@ -10149,7 +4873,7 @@

    Government Crisis

    - @@ -10158,48 +4882,40 @@

    Government Crisis

    -
    -

    Halt Source

    +
    +

    Data Corruption

    TermGovernmentCrisisDataBreach Prefix risk
    LabelGovernment CrisisData Breach
    IRIhttps://w3id.org/dpv/risk#GovernmentCrisishttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionGovernment CrisisSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
    - + - + - + - + - - - - - + @@ -10208,22 +4924,31 @@

    Halt Source

    - + - + + + + - + + + + - + - + + + + @@ -10232,7 +4957,7 @@

    Halt Source

    - @@ -10240,53 +4965,42 @@

    Halt Source

    - -
    -

    Harm

    +
    +

    Deliberate Incident

    TermHaltSourceDataCorruption Prefix risk
    LabelHalt SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10297,7 +5011,7 @@

    Harm

    - + @@ -10310,18 +5024,15 @@

    Harm

    - + - - - - + - @@ -10330,55 +5041,40 @@

    Harm

    -
    -

    Harmful Speech

    +
    +

    Denial of Service Attack (DoS)

    TermHarmDeliberateIncident Prefix risk
    LabelHarmDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes harmsIncident caused due to deliberate actions of a human
    Date Created2022-08-132024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -10387,7 +5083,7 @@

    Harmful Speech

    - + @@ -10396,7 +5092,7 @@

    Harmful Speech

    - + @@ -10405,7 +5101,10 @@

    Harmful Speech

    - + + + + @@ -10423,61 +5122,45 @@

    Harmful Speech

    - - - - - - - - - - -
    -

    Health and life impact

    +
    +

    Detection Control

    TermHarmfulSpeechDenialServiceAttack Prefix risk
    LabelHarmful SpeechDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#HarmfulSpeechhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionHarmful SpeechSomething that acts as or causes Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -10488,34 +5171,28 @@

    Health and life impact

    - + - - - - + - + - - - - + - @@ -10524,52 +5201,40 @@

    Health and life impact

    -
    -

    High Likelihood

    +
    +

    Detriment

    TermHealthLifeImpactDetectionControl Prefix risk
    LabelHealth and life impactDetection Control
    IRIhttps://w3id.org/dpv/risk#HealthLifeImpacthttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionHealth and life impactControl to detect event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -10578,12 +5243,9 @@

    High Likelihood

    - + - - - - + @@ -10594,18 +5256,21 @@

    High Likelihood

    - + - + + + + - + - @@ -10614,52 +5279,40 @@

    High Likelihood

    -
    -

    High Risk

    +
    +

    Discrimination

    TermHighLikelihoodDetriment Prefix risk
    LabelHigh LikelihoodDetriment
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is HighSomething that acts as or causes Detriment
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10668,12 +5321,9 @@

    High Risk

    - + - - - - + @@ -10684,18 +5334,21 @@

    High Risk

    - + - + + + + - + - @@ -10704,52 +5357,40 @@

    High Risk

    -
    -

    High Severity

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermHighRiskDiscrimination Prefix risk
    LabelHigh RiskDiscrimination
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighSomething that acts as or causes Discrimination
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10758,25 +5399,28 @@

    High Severity

    - + - - - - + - + + + + - + - + + + + @@ -10785,7 +5429,7 @@

    High Severity

    - @@ -10793,53 +5437,42 @@

    High Severity

    - -
    -

    Human Errors

    +
    +

    Environmental Incident

    TermHighSeverityDistributedDenialServiceAttack Prefix risk
    LabelHigh SeverityDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is HighSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10850,34 +5483,28 @@

    Human Errors

    - + - - - - + - + - - - - + - @@ -10886,47 +5513,39 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Environmental Risk

    TermHumanErrorsEnvironmentalIncident Prefix risk
    LabelHuman ErrorsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionHuman ErrorsIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -10935,7 +5554,7 @@

    Identification Control

    - + @@ -10946,17 +5565,14 @@

    Identification Control

    - - - - + - @@ -10965,54 +5581,40 @@

    Identification Control

    -
    -

    Identity Dispute

    +
    +

    Equipment Failure

    TermIdentificationControlEnvironmentalRisk Prefix risk
    LabelIdentification ControlEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11021,22 +5623,31 @@

    Identity Dispute

    - + - + + + + - + + + + - + - + + + + @@ -11054,55 +5665,40 @@

    Identity Dispute

    -
    -

    Identity Fraud

    +
    +

    Equipment Malfunction

    TermIdentityDisputeEquipmentFailure Prefix risk
    LabelIdentity DisputeEquipment Failure
    IRIhttps://w3id.org/dpv/risk#IdentityDisputehttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity DisputeSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-242022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11111,16 +5707,19 @@

    Identity Fraud

    - + - + + + + - + @@ -11129,7 +5728,10 @@

    Identity Fraud

    - + + + + @@ -11147,55 +5749,40 @@

    Identity Fraud

    -
    -

    Identity Theft

    +
    +

    Erroneous System Use

    TermIdentityFraudEquipmentMalfunction Prefix risk
    LabelIdentity FraudEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity FraudSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11204,7 +5791,7 @@

    Identity Theft

    - + @@ -11213,7 +5800,7 @@

    Identity Theft

    - + @@ -11222,7 +5809,10 @@

    Identity Theft

    - + + + + @@ -11240,54 +5830,42 @@

    Identity Theft

    -
    -

    Illegal Processing of Data

    + + +
    +

    Exposure to Harmful Speech

    TermIdentityTheftErroneousSystemUse Prefix risk
    LabelIdentity TheftErroneous System Use
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity TheftSomething that acts as or causes Erroneous System Use
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11296,16 +5874,19 @@

    Illegal Processing of Data

    - + - + + + + - + @@ -11314,7 +5895,10 @@

    Illegal Processing of Data

    - + + + + @@ -11332,47 +5916,39 @@

    Illegal Processing of Data

    -
    -

    Impact Control

    +
    +

    External Security Threat

    TermIllegalProcessingDataExposureToHarmfulSpeech Prefix risk
    LabelIllegal Processing of DataExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#IllegalProcessingDatahttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIllegal Processing of DataSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -11381,7 +5957,7 @@

    Impact Control

    - + @@ -11392,20 +5968,14 @@

    Impact Control

    - - - - + - - - - + - @@ -11414,53 +5984,40 @@

    Impact Control

    -
    -

    Impact on Data Subject

    +
    +

    Extorsion

    TermImpactControlExternalSecurityThreat Prefix risk
    LabelImpact ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11469,25 +6026,31 @@

    Impact on Data Subject

    - + - + + + + - + - + + + + - + @@ -11502,51 +6065,42 @@

    Impact on Data Subject

    -
    -

    Impact to Rights

    +
    +

    Extremely High Likelihood

    TermImpactOnDataSubjectExtorsion Prefix risk
    LabelImpact on Data SubjectExtorsion
    IRIhttps://w3id.org/dpv/risk#ImpactOnDataSubjecthttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact on Data SubjectSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-10-222022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Georg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -11557,23 +6111,23 @@

    Impact to Rights

    - + - + + + + - - - - + - + @@ -11584,7 +6138,7 @@

    Impact to Rights

    - @@ -11592,38 +6146,43 @@

    Impact to Rights

    -
    -

    Incident

    + +
    +

    Extremely High Risk

    TermImpactToRightsExtremelyHighLikelihood Prefix risk
    LabelImpact to RightsExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#ImpactToRightshttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Risk + risk:7LikelihoodLevels + → dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionImpact to RightsLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + - @@ -11634,16 +6193,13 @@

    Incident

    - + - + - - - @@ -11653,68 +6209,62 @@

    Incident

    - + - + -
    TermIncidentExtremelyHighRisk Prefix risk
    LabelIncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionAn actual or occured eventLevel where Risk is Extremely High
    Usage NoteIncident is realised or materialised riskThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-05-192022-08-18
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-LEVELS in RISK
    - - -
    -

    Incident Assessment Report

    + +
    +

    Extremely High Severity

    - + - + - + - + - - @@ -11725,9 +6275,12 @@

    Incident Assessment Report

    - + - + + + + @@ -11738,15 +6291,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -11755,44 +6311,42 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Extremely Low Likelihood

    TermIncidentAssessmentReportExtremelyHighSeverity Prefix risk
    LabelIncident Assessment ReportExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11803,9 +6357,12 @@

    Incident Concluded

    - + - + + + + @@ -11816,7 +6373,7 @@

    Incident Concluded

    - + @@ -11827,7 +6384,7 @@

    Incident Concluded

    - @@ -11835,46 +6392,43 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Extremely Low Risk

    TermIncidentConcludedExtremelyLowLikelihood Prefix risk
    LabelIncident ConcludedExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11885,9 +6439,12 @@

    Incident Concluding Report

    - + - + + + + @@ -11898,15 +6455,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -11914,46 +6474,43 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + +
    +

    Extremely Low Severity

    TermIncidentConcludingReportExtremelyLowRisk Prefix risk
    LabelIncident Concluding ReportExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11964,9 +6521,12 @@

    Incident Detection Report

    - + - + + + + @@ -11977,15 +6537,18 @@

    Incident Detection Report

    - + - + + + + - @@ -11994,46 +6557,40 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Fee

    TermIncidentDetectionReportExtremelyLowSeverity Prefix risk
    LabelIncident Detection ReportExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the detection of a IncidentLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12042,31 +6599,37 @@

    Incident Halted

    - + - + + + + - + - + + + + - + - @@ -12074,48 +6637,40 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Financial Impact

    TermIncidentHaltedFee Prefix risk
    LabelIncident HaltedFee
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#Fee
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or provides fees e.g. for using a service
    Source
    Date Created2024-02-142024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12124,7 +6679,7 @@

    Incident Handling Report

    - + @@ -12135,17 +6690,14 @@

    Incident Handling Report

    - - - - + - @@ -12153,33 +6705,38 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Financial Loss

    TermIncidentHandlingReportFinancialImpact Prefix risk
    LabelIncident Handling ReportFinancial Impact
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceThings that cause or have the potential to impact financial resources
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -12191,28 +6748,37 @@

    Incident Identifier

    - + - + + + + - + - - + + + + + + + + - @@ -12220,51 +6786,41 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Fraud

    TermIncidentIdentifierFinancialLoss Prefix risk
    LabelIncident IdentifierFinancial Loss
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incidentSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12273,22 +6829,28 @@

    Incident Impact Assessment

    - + - + + + + - + - + + + + @@ -12297,7 +6859,7 @@

    Incident Impact Assessment

    - @@ -12306,44 +6868,46 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    +
    +

    Halt Source

    TermIncidentImpactAssessmentFraud Prefix risk
    LabelIncident Impact AssessmentFraud
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentSomething that acts as or causes Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12354,7 +6918,7 @@

    Incident Mitigated

    - + @@ -12367,7 +6931,7 @@

    Incident Mitigated

    - + @@ -12378,7 +6942,7 @@

    Incident Mitigated

    - @@ -12386,45 +6950,40 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + +
    +

    Harm

    TermIncidentMitigatedHaltSource Prefix risk
    LabelIncident MitigatedHalt Source
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringControl that halts the risk source or prevents it from materialising
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12433,9 +6992,12 @@

    Incident Mitigation Measure

    - + - + + + + @@ -12446,15 +7008,21 @@

    Incident Mitigation Measure

    - + - - + + + + + + + + - @@ -12463,44 +7031,60 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + + + + + + +
    +

    High Likelihood

    TermIncidentMitigationMeasureHarm Prefix risk
    LabelIncident Mitigation MeasureHarm
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2024-05-192022-08-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -12511,9 +7095,12 @@

    Incident Near Miss

    - + - + + + + @@ -12524,7 +7111,7 @@

    Incident Near Miss

    - + @@ -12535,7 +7122,7 @@

    Incident Near Miss

    - @@ -12543,45 +7130,51 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + +
    +

    High Risk

    TermIncidentNearMissHighLikelihood Prefix risk
    LabelIncident Near MissHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Level where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12592,9 +7185,12 @@

    Incident Notice

    - + - + + + + @@ -12605,15 +7201,18 @@

    Incident Notice

    - + - + + + + - @@ -12622,44 +7221,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    +
    +

    High Severity

    TermIncidentNoticeHighRisk Prefix risk
    LabelIncident NoticeHigh Risk
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionNotice associated with an IncidentLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12670,9 +7275,12 @@

    Incident Ongoing

    - + - + + + + @@ -12683,7 +7291,7 @@

    Incident Ongoing

    - + @@ -12694,7 +7302,7 @@

    Incident Ongoing

    - @@ -12702,48 +7310,41 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + +
    +

    Human Errors

    TermIncidentOngoingHighSeverity Prefix risk
    LabelIncident OngoingHigh Severity
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionThe incident is ongoing i.e. still activeLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12752,28 +7353,37 @@

    Incident Ongoing Report

    - + - + + + + - + - - + + + + + + + + - @@ -12781,46 +7391,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + +
    +

    Identification Control

    TermIncidentOngoingReportHumanErrors Prefix risk
    LabelIncident Ongoing ReportHuman Errors
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12831,7 +7441,7 @@

    Incident Preliminary Report

    - + @@ -12852,7 +7462,7 @@

    Incident Preliminary Report

    - @@ -12860,47 +7470,41 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Identity Fraud

    TermIncidentPreliminaryReportIdentificationControl Prefix risk
    LabelIncident Preliminary ReportIdentification Control
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12909,22 +7513,28 @@

    Incident Register

    - + - + + + + - + - + + + + @@ -12933,7 +7543,7 @@

    Incident Register

    - @@ -12941,47 +7551,41 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Identity Theft

    TermIncidentRegisterIdentityFraud Prefix risk
    LabelIncident RegisterIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + + @@ -12990,28 +7594,37 @@

    Incident Report

    - + - + + + + - + - - + + + + + + + + - @@ -13019,45 +7632,41 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Illegal Data Processing

    TermIncidentReportIdentityTheft Prefix risk
    LabelIncident ReportIdentity Theft
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -13066,25 +7675,31 @@

    Incident Status

    - + + + + + - - - - - + + + + - + - + + + + @@ -13093,7 +7708,7 @@

    Incident Status

    - @@ -13102,44 +7717,45 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Impact Control

    TermIncidentStatusIllegalDataProcessing Prefix risk
    LabelIncident StatusIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Status - → dpv:Context + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -13150,7 +7766,7 @@

    Incident Status Unknown

    - + @@ -13163,7 +7779,7 @@

    Incident Status Unknown

    - + @@ -13174,7 +7790,7 @@

    Incident Status Unknown

    - @@ -13182,45 +7798,41 @@

    Incident Status Unknown

    - -
    -

    Incident Suspected

    +
    +

    Incident

    TermIncidentStatusUnknownImpactControl Prefix risk
    LabelIncident Status UnknownImpact Control
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownRisk Mitigation Measure that controls Impacts
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -13231,10 +7843,16 @@

    Incident Suspected

    - + + + + + - + + + @@ -13246,40 +7864,46 @@

    Incident Suspected

    - + + + + - + -
    TermIncidentSuspectedIncident Prefix risk
    LabelIncident SuspectedIncident
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section INCIDENT-STATUS in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + -
    -

    Incident Suspected Report

    +
    +

    Incident Assessment Report

    - + - + - + @@ -13313,7 +7937,7 @@

    Incident Suspected Report

    - + @@ -13343,23 +7967,23 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Incident Concluded

    TermIncidentSuspectedReportIncidentAssessmentReport Prefix risk
    LabelIncident Suspected ReportIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#IncidentAssessmentReport
    DefinitionA report describing the suspicion of an incident in the past or occuringA report describing the assessment of an incident in terms of its effects or impacts
    - + - + - + @@ -13391,7 +8015,7 @@

    Incident Terminated

    - + @@ -13423,53 +8047,46 @@

    Incident Terminated

    - -
    -

    Increase Internal Cost

    +
    +

    Incident Concluding Report

    TermIncidentTerminatedIncidentConcluded Prefix risk
    LabelIncident TerminatedIncident Concluded
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#IncidentConcluded
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + - @@ -13480,34 +8097,28 @@

    Increase Internal Cost

    - + - - - - + - + - - - - + - @@ -13515,53 +8126,46 @@

    Increase Internal Cost

    - -
    -

    Industrial Crisis

    +
    +

    Incident Detection Report

    TermIncreaseInternalCostIncidentConcludingReport Prefix risk
    LabelIncrease Internal CostIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#IncreaseInternalCosthttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncrease Internal CostA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13572,34 +8176,28 @@

    Industrial Crisis

    - + - - - - + - + - - - - + - @@ -13608,53 +8206,44 @@

    Industrial Crisis

    -
    -

    Injury

    +
    +

    Incident Halted

    TermIndustrialCrisisIncidentDetectionReport Prefix risk
    LabelIndustrial CrisisIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#IndustrialCrisishttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIndustrial CrisisA report describing the detection of a Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13665,23 +8254,20 @@

    Injury

    - + - - - - + - + @@ -13692,7 +8278,7 @@

    Injury

    - @@ -13700,23 +8286,23 @@

    Injury

    -
    -

    Integrity Incident

    +
    +

    Incident Handling Report

    TermInjuryIncidentHalted Prefix risk
    LabelInjuryIncident Halted
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionInjuryThe incident has halted or paused with a high likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13728,13 +8314,18 @@

    Integrity Incident

    - - @@ -13745,7 +8336,7 @@

    Integrity Incident

    - + @@ -13774,55 +8365,36 @@

    Integrity Incident

    - -
    -

    Interception of Communications

    +
    +

    Incident Identifier

    TermIntegrityIncidentIncidentHandlingReport Prefix risk
    LabelIntegrity IncidentIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#IncidentHandlingReport
    Broader/Parent types risk:Incident + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident where the integrity of information or system has been affectedA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    - + - + - + - + - - - - - - - - - - - + + + @@ -13831,34 +8403,28 @@

    Interception of Communications

    - + - - - - + - + - - - - + - @@ -13866,53 +8432,49 @@

    Interception of Communications

    - -
    -

    Internal Operation Disruption

    +
    +

    Incident Impact Assessment

    TermInterceptionCommunicationsIncidentIdentifier Prefix risk
    LabelInterception of CommunicationsIncident Identifier
    IRIhttps://w3id.org/dpv/risk#InterceptionCommunicationshttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInterception of CommunicationsIdentifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13923,23 +8485,20 @@

    Internal Operation Disruption

    - + - - - - + - + @@ -13950,7 +8509,7 @@

    Internal Operation Disruption

    - @@ -13959,56 +8518,44 @@

    Internal Operation Disruption

    - - - - -
    -

    Known Vulnerability Exploited

    +
    +

    Incident Mitigated

    TermInternalOperationDisruptionIncidentImpactAssessment Prefix risk
    LabelInternal Operation DisruptionIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#InternalOperationDisruptionhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionInternal Operation DisruptionAn impact assessment associated with a incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14019,23 +8566,20 @@

    Known Vulnerability Exploited

    - + - - - - + - + @@ -14046,7 +8590,7 @@

    Known Vulnerability Exploited

    - @@ -14054,53 +8598,43 @@

    Known Vulnerability Exploited

    - -
    -

    Law Enforcement Adverse Effects

    +
    +

    Incident Mitigation Measure

    TermKnownVulnerabilityExploitedIncidentMitigated Prefix risk
    LabelKnown Vulnerability ExploitedIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#KnownVulnerabilityExploitedhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionKnown Vulnerability ExploitedThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14111,34 +8645,28 @@

    Law Enforcement Adverse Effects

    - + - - - - + - + - - - - + - @@ -14147,53 +8675,44 @@

    Law Enforcement Adverse Effects

    -
    -

    Limitation of Rights

    +
    +

    Incident Near Miss

    TermLawEnforcementAdverseEffectsIncidentMitigationMeasure Prefix risk
    LabelLaw Enforcement Adverse EffectsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#LawEnforcementAdverseEffectshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure
    DefinitionLaw Enforcement Adverse EffectsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14204,7 +8723,7 @@

    Limitation of Rights

    - + @@ -14217,18 +8736,18 @@

    Limitation of Rights

    - + - + - @@ -14236,54 +8755,45 @@

    Limitation of Rights

    - -
    -

    Loss of Assets

    +
    +

    Incident Notice

    TermLimitationOfRightsIncidentNearMiss Prefix risk
    LabelLimitation of RightsIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#LimitationOfRightshttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLimitation of RightsThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2022-08-182024-02-14
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14294,34 +8804,28 @@

    Loss of Assets

    - + - - - - + - + - - - - + - @@ -14330,53 +8834,44 @@

    Loss of Assets

    -
    -

    Loss of Competitive Advantage

    +
    +

    Incident Ongoing

    TermLossAssetsIncidentNotice Prefix risk
    LabelLoss of AssetsIncident Notice
    IRIhttps://w3id.org/dpv/risk#LossAssetshttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of AssetsNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14387,23 +8882,20 @@

    Loss of Competitive Advantage

    - + - - - - + - + @@ -14414,7 +8906,7 @@

    Loss of Competitive Advantage

    - @@ -14422,54 +8914,46 @@

    Loss of Competitive Advantage

    - -
    -

    Loss of Control over Data

    +
    +

    Incident Ongoing Report

    TermLossCompetitiveAdvantageIncidentOngoing Prefix risk
    LabelLoss of Competitive AdvantageIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#LossCompetitiveAdvantagehttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Competitive AdvantageThe incident is ongoing i.e. still active
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - + + - @@ -14480,7 +8964,7 @@

    Loss of Control over Data

    - + @@ -14493,18 +8977,15 @@

    Loss of Control over Data

    - + - - - - + - @@ -14512,53 +8993,46 @@

    Loss of Control over Data

    - -
    -

    Loss of Credibility

    +
    +

    Incident Preliminary Report

    TermLossControlOverDataIncidentOngoingReport Prefix risk
    LabelLoss of Control over DataIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#LossControlOverDatahttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Control over DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14569,34 +9043,28 @@

    Loss of Credibility

    - + - - - - + - + - - - - + - @@ -14604,53 +9072,45 @@

    Loss of Credibility

    - -
    -

    Loss of Customer Confidence

    +
    +

    Incident Register

    TermLossCredibilityIncidentPreliminaryReport Prefix risk
    LabelLoss of CredibilityIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#LossCredibilityhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CredibilityA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14661,23 +9121,20 @@

    Loss of Customer Confidence

    - + - - - - + - + @@ -14688,7 +9145,7 @@

    Loss of Customer Confidence

    - @@ -14696,54 +9153,45 @@

    Loss of Customer Confidence

    - -
    -

    Loss of Customers

    +
    +

    Incident Report

    TermLossCustomerConfidenceIncidentRegister Prefix risk
    LabelLoss of Customer ConfidenceIncident Register
    IRIhttps://w3id.org/dpv/risk#LossCustomerConfidencehttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Customer ConfidenceA register recording incidentes, their reports, notifications, and other related activities
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14754,34 +9202,28 @@

    Loss of Customers

    - + - - - - + - + - - - - + - @@ -14789,54 +9231,43 @@

    Loss of Customers

    - -
    -

    Loss of Data

    +
    +

    Incident Status

    TermLossCustomersIncidentReport Prefix risk
    LabelLoss of CustomersIncident Report
    IRIhttps://w3id.org/dpv/risk#LossCustomershttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CustomersDocumented information about an incident, its handling, assessments,and notifications
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14847,23 +9278,23 @@

    Loss of Data

    - + + + + - - - - + - + @@ -14874,7 +9305,7 @@

    Loss of Data

    - @@ -14883,53 +9314,44 @@

    Loss of Data

    -
    -

    Loss of Funds

    +
    +

    Incident Status Unknown

    TermLossDataIncidentStatus Prefix risk
    LabelLoss of DataIncident Status
    IRIhttps://w3id.org/dpv/risk#LossDatahttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of DataStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - - - - + - @@ -14940,23 +9362,20 @@

    Loss of Funds

    - + - - - - + - + @@ -14967,7 +9386,7 @@

    Loss of Funds

    - @@ -14976,53 +9395,44 @@

    Loss of Funds

    -
    -

    Loss of Goods

    +
    +

    Incident Suspected

    TermLossFundsIncidentStatusUnknown Prefix risk
    LabelLoss of FundsIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#LossFundshttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of FundsThe status of a incident is unknown
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15033,23 +9443,20 @@

    Loss of Goods

    - + - - - - + - + @@ -15060,7 +9467,7 @@

    Loss of Goods

    - @@ -15068,53 +9475,46 @@

    Loss of Goods

    - -
    -

    Loss of Goodwill

    +
    +

    Incident Suspected Report

    TermLossGoodsIncidentSuspected Prefix risk
    LabelLoss of GoodsIncident Suspected
    IRIhttps://w3id.org/dpv/risk#LossGoodshttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of GoodsThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15125,34 +9525,28 @@

    Loss of Goodwill

    - + - - - - + - + - - - - + - @@ -15161,52 +9555,44 @@

    Loss of Goodwill

    -
    -

    Loss of Negotiating Capacity

    +
    +

    Incident Terminated

    TermLossGoodwillIncidentSuspectedReport Prefix risk
    LabelLoss of GoodwillIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#LossGoodwillhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of GoodwillA report describing the suspicion of an incident in the past or occuring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -15217,23 +9603,20 @@

    Loss of Negotiating Capacity

    - + - - - - - - + + + - + @@ -15244,7 +9627,7 @@

    Loss of Negotiating Capacity

    - @@ -15253,85 +9636,58 @@

    Loss of Negotiating Capacity

    -
    -

    Loss of Opportunity

    +
    +

    Individual Health & Safety

    TermLossNegotiatingCapacityIncidentTerminated Prefix risk
    LabelLoss of Negotiating CapacityIncident Terminated
    IRIhttps://w3id.org/dpv/risk#LossNegotiatingCapacityhttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Negotiating CapacityThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15344,56 +9700,36 @@

    Loss of Opportunity

    - -
    -

    Loss of Proprietary Information

    +
    +

    Individual Risk

    TermLossOpportunityIndividualHealthSafety Prefix risk
    LabelLoss of OpportunityIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#LossOpportunityhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - - - + + + @@ -15402,29 +9738,20 @@

    Loss of Proprietary Information

    - + - - - - + - - - - + - - - - + @@ -15438,54 +9765,39 @@

    Loss of Proprietary Information

    -
    -

    Loss of Reputation

    +
    +

    Injury

    TermLossProprietaryInformationIndividualRisk Prefix risk
    LabelLoss of Proprietary InformationIndividual Risk
    IRIhttps://w3id.org/dpv/risk#LossProprietaryInformationhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Proprietary InformationRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15494,7 +9806,7 @@

    Loss of Reputation

    - + @@ -15512,7 +9824,10 @@

    Loss of Reputation

    - + + + + @@ -15530,86 +9845,61 @@

    Loss of Reputation

    -
    -

    Loss of Resources

    +
    +

    None

    TermLossReputationInjury Prefix risk
    LabelLoss of ReputationInjury
    IRIhttps://w3id.org/dpv/risk#LossReputationhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of ReputationSomething that acts as or causes Injury
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15622,54 +9912,42 @@

    Loss of Resources

    - -
    -

    Loss of Suppliers

    +
    +

    Integrity Incident

    TermLossResourcesIntegrityBreach Prefix risk
    LabelLoss of ResourcesNone
    IRIhttps://w3id.org/dpv/risk#LossResourceshttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Resources
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -15680,34 +9958,28 @@

    Loss of Suppliers

    - + - - - - + - + - - - - + - @@ -15716,55 +9988,40 @@

    Loss of Suppliers

    -
    -

    Loss of Technological Advantage

    +
    +

    Intentional Misuse

    TermLossSuppliersIntegrityIncident Prefix risk
    LabelLoss of SuppliersIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#LossSuppliershttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionLoss of SuppliersIncident where the integrity of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -15773,29 +10030,20 @@

    Loss of Technological Advantage

    - + - - - - + - - - - + - - - - + @@ -15809,54 +10057,40 @@

    Loss of Technological Advantage

    -
    -

    Loss of Trust

    +
    +

    Intercept Communications

    TermLossTechnologicalAdvantageIntentionalMisuse Prefix risk
    LabelLoss of Technological AdvantageIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#LossTechnologicalAdvantagehttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Technological AdvantageIntentional Misuse
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15865,9 +10099,12 @@

    Loss of Trust

    - + - + + + + @@ -15883,7 +10120,10 @@

    Loss of Trust

    - + + + + @@ -15901,52 +10141,39 @@

    Loss of Trust

    -
    -

    Low Likelihood

    +
    +

    Internal Security Threat

    TermLossTrustInterceptCommunications Prefix risk
    LabelLoss of TrustIntercept Communications
    IRIhttps://w3id.org/dpv/risk#LossTrusthttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of TrustSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -15955,12 +10182,9 @@

    Low Likelihood

    - + - - - - + @@ -15969,20 +10193,14 @@

    Low Likelihood

    - - - - + - - - - + - @@ -15991,52 +10209,44 @@

    Low Likelihood

    -
    -

    Low Risk

    + + + + +
    +

    Judicial Costs

    TermLowLikelihoodInternalSecurityThreat Prefix risk
    LabelLow LikelihoodInternal Security Threat
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#InternalSecurityThreat
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowConcepts associated with security threats and issues that originate within the organisation
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - - - - - - - - - - - + + + + + + + - - - - - + @@ -16045,12 +10255,9 @@

    Low Risk

    - + - - - - + @@ -16059,20 +10266,14 @@

    Low Risk

    - - - - + - - - - + - @@ -16081,52 +10282,40 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Judicial Penalty

    TermLowRiskJudicialCosts Prefix risk
    LabelLow RiskJudicial Costs
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that involves or causes judicial costs to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16135,12 +10324,9 @@

    Low Severity

    - + - - - - + @@ -16149,20 +10335,14 @@

    Low Severity

    - - - - + - - - - + - @@ -16171,54 +10351,39 @@

    Low Severity

    -
    -

    Malicious Code Attack

    +
    +

    Legal Risk

    TermLowSeverityJudicialPenalty Prefix risk
    LabelLow SeverityJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowSomething that involves or causes judicial penalties to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -16227,29 +10392,20 @@

    Malicious Code Attack

    - + - - - - + - - - - + - - - - + @@ -16263,54 +10419,40 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Lose of Credibility

    TermMaliciousCodeAttackLegalRisk Prefix risk
    LabelMalicious Code AttackLegal Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIntentional use of software by including or inserting in a system for a harmful purposeRisks and issues that have their basis in legal requirements and enforcement
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16319,7 +10461,7 @@

    Malware Attack

    - + @@ -16328,7 +10470,7 @@

    Malware Attack

    - + @@ -16337,7 +10479,10 @@

    Malware Attack

    - + + + + @@ -16355,54 +10500,40 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Lose of Customer Confidence

    TermMalwareAttackLoseCredibility Prefix risk
    LabelMalware AttackLose of Credibility
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMalware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a systemSomething that acts as or causes Loss of Credibility
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16411,22 +10542,28 @@

    Material Damage

    - + - + + + + - + - + + + + @@ -16444,54 +10581,40 @@

    Material Damage

    -
    -

    Misinformation and Disinformation

    +
    +

    Lose of Goodwill

    TermMaterialDamageLoseCustomerConfidence Prefix risk
    LabelMaterial DamageLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact that acts as or causes material damagesSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-03-302022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16500,7 +10623,7 @@

    Misinformation and Disinformation

    - + @@ -16509,7 +10632,7 @@

    Misinformation and Disinformation

    - + @@ -16518,7 +10641,10 @@

    Misinformation and Disinformation

    - + + + + @@ -16536,53 +10662,40 @@

    Misinformation and Disinformation

    -
    -

    Misuse

    +
    +

    Lose of Negotiating Capacity

    TermMisinformationDisinformationLoseGoodwill Prefix risk
    LabelMisinformation and DisinformationLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#MisinformationDisinformationhttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInformation that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)Something that acts as or causes Loss of Goodwill
    SourceENISA Threat Landscape 2021ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16591,25 +10704,31 @@

    Misuse

    - + - + + + + - + - + + + + - + @@ -16624,54 +10743,40 @@

    Misuse

    -
    -

    Misuse of Breached Information

    +
    +

    Lose of Opportunity

    TermMisuseLoseNegotiatingCapacity Prefix risk
    LabelMisuseLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuseSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-06-112022-08-17
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16680,7 +10785,7 @@

    Misuse of Breached Information

    - + @@ -16698,7 +10803,10 @@

    Misuse of Breached Information

    - + + + + @@ -16716,52 +10824,40 @@

    Misuse of Breached Information

    -
    -

    Moderate Likelihood

    +
    +

    Lose of Reputation

    TermMisuseBreachedInformationLoseOpportunity Prefix risk
    LabelMisuse of Breached InformationLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#MisuseBreachedInformationhttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuse of Breached InformationSomething that acts as or causes Loss of Opportunity
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -16770,25 +10866,28 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -16797,7 +10896,7 @@

    Moderate Likelihood

    - @@ -16806,52 +10905,40 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    +
    +

    Lose of Trust

    TermModerateLikelihoodLoseReputation Prefix risk
    LabelModerate LikelihoodLose of Reputation
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateSomething that acts as or causes Loss of Reputation
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16860,25 +10947,28 @@

    Moderate Risk

    - + - - - - + - + + + + - + - + + + + @@ -16887,7 +10977,7 @@

    Moderate Risk

    - @@ -16896,50 +10986,50 @@

    Moderate Risk

    -
    -

    Moderate Severity

    +
    +

    Low Likelihood

    TermModerateRiskLoseTrust Prefix risk
    LabelModerate RiskLose of Trust
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Loss of Trust
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - @@ -16950,11 +11040,11 @@

    Moderate Severity

    - + - + @@ -16986,46 +11076,50 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Low Risk

    TermModerateSeverityLowLikelihood Prefix risk
    LabelModerate SeverityLow Likelihood
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity + risk:3LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasSeverity + dpv:hasLikelihood
    DefinitionLevel where Severity is ModerateLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    - + - + - + - + - + + + + - @@ -17036,9 +11130,12 @@

    Monitor Consequence

    - + - + + + + @@ -17049,7 +11146,7 @@

    Monitor Consequence

    - + @@ -17060,7 +11157,7 @@

    Monitor Consequence

    - @@ -17069,45 +11166,50 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Low Severity

    TermMonitorConsequenceLowRisk Prefix risk
    LabelMonitor ConsequenceLow Risk
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that monitors a Risk ConsequenceLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -17118,11 +11220,11 @@

    Monitor Control

    - + - + @@ -17134,7 +11236,7 @@

    Monitor Control

    - + @@ -17145,7 +11247,7 @@

    Monitor Control

    - @@ -17154,48 +11256,40 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Malicious Code Attack

    TermMonitorControlLowSeverity Prefix risk
    LabelMonitor ControlLow Severity
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsLevel where Severity is Low
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -17204,22 +11298,28 @@

    Monitor Impact

    - + - + + + + - + - + + + + @@ -17228,7 +11328,7 @@

    Monitor Impact

    - @@ -17237,48 +11337,40 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Malware Attack

    TermMonitorImpactMaliciousCodeAttack Prefix risk
    LabelMonitor ImpactMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17287,22 +11379,28 @@

    Monitor Risk

    - + - + + + + - + - + + + + @@ -17311,7 +11409,7 @@

    Monitor Risk

    - @@ -17320,48 +11418,40 @@

    Monitor Risk

    -
    -

    Monitor Control

    +
    +

    Material Damage

    TermMonitorRiskMalwareAttack Prefix risk
    LabelMonitor RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskSomething that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17370,9 +11460,12 @@

    Monitor Control

    - + - + + + + @@ -17383,9 +11476,12 @@

    Monitor Control

    - + - + + + + @@ -17394,7 +11490,7 @@

    Monitor Control

    - @@ -17403,48 +11499,40 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    +
    +

    Misuse

    TermMonitorRiskControlMaterialDamage Prefix risk
    LabelMonitor ControlMaterial Damage
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17453,7 +11541,7 @@

    Monitor Risk Source

    - + @@ -17466,18 +11554,21 @@

    Monitor Risk Source

    - + - + + + + - + - @@ -17486,46 +11577,50 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    +
    +

    Moderate Likelihood

    TermMonitorRiskSourceMisuse Prefix risk
    LabelMonitor Risk SourceMisuse
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -17536,9 +11631,12 @@

    Monitor Vulnerabilities

    - + - + + + + @@ -17549,7 +11647,7 @@

    Monitor Vulnerabilities

    - + @@ -17560,7 +11658,7 @@

    Monitor Vulnerabilities

    - @@ -17569,52 +11667,50 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    +
    +

    Moderate Risk

    TermMonitorVulnerabilitiesModerateLikelihood Prefix risk
    LabelMonitor VulnerabilitiesModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that monitors a Risk VulnerabilityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17625,9 +11721,12 @@

    Non-Material Damage

    - + - + + + + @@ -17638,7 +11737,7 @@

    Non-Material Damage

    - + @@ -17649,7 +11748,7 @@

    Non-Material Damage

    - @@ -17658,52 +11757,50 @@

    Non-Material Damage

    -
    -

    Organisation Disruption

    +
    +

    Moderate Severity

    TermNonMaterialDamageModerateRisk Prefix risk
    LabelNon-Material DamageModerate Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Damage - → dpv:Risk + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes non-material damagesLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17714,23 +11811,23 @@

    Organisation Disruption

    - + - + + + + - - - - + - + @@ -17741,7 +11838,7 @@

    Organisation Disruption

    - @@ -17750,49 +11847,46 @@

    Organisation Disruption

    -
    -

    Payment

    +
    +

    Monitor Consequence

    TermOrganisationDisruptionModerateSeverity Prefix risk
    LabelOrganisation DisruptionModerate Severity
    IRIhttps://w3id.org/dpv/risk#OrganisationDisruptionhttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionOrganisation DisruptionLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -17803,7 +11897,7 @@

    Payment

    - + @@ -17816,18 +11910,18 @@

    Payment

    - + - + - @@ -17836,53 +11930,45 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Monitor Control

    TermPaymentMonitorConsequence Prefix risk
    LabelPaymentMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPayment provided as compensation (as an impact)Control that monitors a Risk Consequence
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17893,23 +11979,23 @@

    Personal Safety Endangerment

    - + - + + + + - - - - + - + @@ -17920,7 +12006,7 @@

    Personal Safety Endangerment

    - @@ -17929,53 +12015,46 @@

    Personal Safety Endangerment

    -
    -

    Personnel Absence

    +
    +

    Monitor Impact

    TermPersonalSafetyEndangermentMonitorControl Prefix risk
    LabelPersonal Safety EndangermentMonitor Control
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonal Safety EndangermentRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17986,23 +12065,20 @@

    Personnel Absence

    - + - - - - + - + @@ -18013,7 +12089,7 @@

    Personnel Absence

    - @@ -18022,53 +12098,46 @@

    Personnel Absence

    -
    -

    Phishing Scam

    +
    +

    Monitor Risk

    TermPersonnelAbsenceMonitorImpact Prefix risk
    LabelPersonnel AbsenceMonitor Impact
    IRIhttps://w3id.org/dpv/risk#PersonnelAbsencehttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonnel AbsenceControl that monitors a Risk Impact
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18079,23 +12148,20 @@

    Phishing Scam

    - + - - - - + - + @@ -18106,7 +12172,7 @@

    Phishing Scam

    - @@ -18115,53 +12181,46 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Monitor Control

    TermPhishingScamMonitorRisk Prefix risk
    LabelPhishing ScamMonitor Risk
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA type of social engineering attack involving deceptive messages intended to reveal sensitive informationControl that monitors a Risk
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18172,23 +12231,20 @@

    Physical Assault

    - + - - - - + - + @@ -18199,7 +12255,7 @@

    Physical Assault

    - @@ -18208,53 +12264,46 @@

    Physical Assault

    -
    -

    Physical Spying

    +
    +

    Monitor Risk Source

    TermPhysicalAssaultMonitorRiskControl Prefix risk
    LabelPhysical AssaultMonitor Control
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical AssaultControl that monitors another Control
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18265,23 +12314,20 @@

    Physical Spying

    - + - - - - + - + @@ -18292,7 +12338,7 @@

    Physical Spying

    - @@ -18301,53 +12347,46 @@

    Physical Spying

    -
    -

    Physical Stalking

    +
    +

    Monitor Vulnerabilities

    TermPhysicalSpyingMonitorRiskSource Prefix risk
    LabelPhysical SpyingMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#PhysicalSpyinghttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical SpyingControl that monitors a Risk Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18358,23 +12397,20 @@

    Physical Stalking

    - + - - - - + - + @@ -18385,7 +12421,7 @@

    Physical Stalking

    - @@ -18394,55 +12430,40 @@

    Physical Stalking

    -
    -

    Prevent Exercising of Rights

    +
    +

    Non-Material Damage

    TermPhysicalStalkingMonitorVulnerabilities Prefix risk
    LabelPhysical StalkingMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#PhysicalStalkinghttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical StalkingControl that monitors a Risk Vulnerability
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -18451,9 +12472,12 @@

    Prevent Exercising of Rights

    - + - + + + + @@ -18464,12 +12488,15 @@

    Prevent Exercising of Rights

    - + - + + + + - + @@ -18484,53 +12511,39 @@

    Prevent Exercising of Rights

    -
    -

    Privacy impact

    +
    +

    Operational Security Risk

    TermPreventExercisingOfRightsNonMaterialDamage Prefix risk
    LabelPrevent Exercising of RightsNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#PreventExercisingOfRightshttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrevent Exercising of RightsSomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-08-182022-03-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18539,29 +12552,20 @@

    Privacy impact

    - + - - - - + - - - - + - - - - + @@ -18575,55 +12579,40 @@

    Privacy impact

    -
    -

    Psychological Harm

    +
    +

    Payment

    TermPrivacyImpactOperationalSecurityRisk Prefix risk
    LabelPrivacy impactOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#PrivacyImpacthttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrivacy impactRisks and issues that arise during operational processes
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18632,28 +12621,28 @@

    Psychological Harm

    - + - - - - + - + - + + + + - + @@ -18668,54 +12657,40 @@

    Psychological Harm

    -
    -

    Public Order Breach

    +
    +

    Personal Safety Endangerment

    TermPsychologicalHarmPayment Prefix risk
    LabelPsychological HarmPayment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPsychological HarmSomething that acts as or provides payment e.g. to access a service or purchase resources
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18724,7 +12699,7 @@

    Public Order Breach

    - + @@ -18742,7 +12717,10 @@

    Public Order Breach

    - + + + + @@ -18760,55 +12738,40 @@

    Public Order Breach

    -
    -

    Ransomware Attack

    +
    +

    Phishing Scam

    TermPublicOrderBreachPersonalSafetyEndangerment Prefix risk
    LabelPublic Order BreachPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPublic Order BreachSomething that acts as or causes Personal Safety Endangerment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18817,7 +12780,7 @@

    Ransomware Attack

    - + @@ -18826,7 +12789,7 @@

    Ransomware Attack

    - + @@ -18835,7 +12798,10 @@

    Ransomware Attack

    - + + + + @@ -18853,47 +12819,39 @@

    Ransomware Attack

    -
    -

    Recovery Control

    +
    +

    Physical Assault

    TermRansomwareAttackPhishingScam Prefix risk
    LabelRansomware AttackPhishing Scam
    IRIhttps://w3id.org/dpv/risk#RansomwareAttackhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRansomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentialitySomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -18902,28 +12860,37 @@

    Recovery Control

    - + - + + + + - + - - + + + + + + + + - @@ -18932,58 +12899,46 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Physical Harm

    TermRecoveryControlPhysicalAssault Prefix risk
    LabelRecovery ControlPhysical Assault
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSomething that acts as or causes Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -18993,20 +12948,14 @@

    Reduce Likelihood

    - - - - + - - - - + - @@ -19015,58 +12964,46 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Privacy

    TermReduceLikelihoodPhysicalHarm Prefix risk
    LabelReduce LikelihoodPhysical Harm
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -19076,20 +13013,14 @@

    Reduce Severity

    - - - - + - - - - + - @@ -19098,47 +13029,39 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Psychological Harm

    TermReduceSeverityPrivacy Prefix risk
    LabelReduce SeverityPrivacy
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -19147,28 +13070,37 @@

    Reduction Control

    - + - + + + + - + - - + + + + + + + + - @@ -19177,55 +13109,40 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Public Order Breach

    TermReductionControlPsychologicalHarm Prefix risk
    LabelReduction ControlPsychological Harm
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or causes Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -19234,22 +13151,28 @@

    Re-identification

    - + - + + + + - + - + + + + @@ -19267,23 +13190,23 @@

    Re-identification

    -
    -

    Remedy Control

    +
    +

    Recovery Control

    TermReidentificationPublicOrderBreach Prefix risk
    LabelRe-identificationPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRe-identificationSomething that acts as or causes Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + @@ -19316,7 +13239,7 @@

    Remedy Control

    - + @@ -19346,53 +13269,46 @@

    Remedy Control

    -
    -

    Remote Spying

    +
    +

    Reduce Likelihood

    TermRemedyControlRecoveryControl Prefix risk
    LabelRemedy ControlRecovery Control
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RecoveryControl
    DefinitionControl to remedy consequences of eventControl to recover from event
    - + - + - + - + - - - - - + - @@ -19403,23 +13319,20 @@

    Remote Spying

    - + - - - - + - + @@ -19430,7 +13343,7 @@

    Remote Spying

    - @@ -19439,23 +13352,23 @@

    Remote Spying

    -
    -

    Remove Consequence

    +
    +

    Reduce Severity

    TermRemoteSpyingReduceLikelihood Prefix risk
    LabelRemote SpyingReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#RemoteSpyinghttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRemote SpyingControl that reduces the likelihood of an event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -19467,7 +13380,7 @@

    Remove Consequence

    - - + @@ -19522,23 +13435,23 @@

    Remove Consequence

    -
    -

    Remove Impact

    +
    +

    Reduction Control

    TermRemoveConsequenceReduceSeverity Prefix risk
    LabelRemove ConsequenceReduce Severity
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#ReduceSeverity
    Broader/Parent types risk:ConsequenceControl + risk:ReductionControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -19489,7 +13402,7 @@

    Remove Consequence

    DefinitionControl that removes Consequence i.e. prevents it from materialisingControl that reduces the severity of an event
    - + - + - + @@ -19550,8 +13463,7 @@

    Remove Impact

    - @@ -19572,7 +13484,7 @@

    Remove Impact

    - + @@ -19586,12 +13498,9 @@

    Remove Impact

    - - - - - - + + + @@ -19605,48 +13514,42 @@

    Remove Impact

    -
    -

    Remove Source

    + + +
    +

    Re-identification

    TermRemoveImpactReductionControl Prefix risk
    LabelRemove ImpactReduction Control
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#ReductionControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that removes Impact i.e. prevents it from materialisingControl that reduces the likelihood or severity of an event
    Date Created 2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -19655,9 +13558,12 @@

    Remove Source

    - + - + + + + @@ -19668,9 +13574,12 @@

    Remove Source

    - + - + + + + @@ -19679,7 +13588,7 @@

    Remove Source

    - @@ -19688,49 +13597,45 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Remedy Control

    TermRemoveSourceReidentification Prefix risk
    LabelRemove SourceRe-identification
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceSomething that acts as or causes Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2024-05-192022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -19741,7 +13646,7 @@

    Remuneration

    - + @@ -19754,18 +13659,15 @@

    Remuneration

    - + - - - - + - @@ -19774,52 +13676,46 @@

    Remuneration

    -
    -

    Replacement Costs

    +
    +

    Remove Consequence

    TermRenumerationRemedyControl Prefix risk
    LabelRemunerationRemedy Control
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRenumeration provided as compensation (as an impact)Control to remedy consequences of event
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19830,23 +13726,20 @@

    Replacement Costs

    - + - - - - + - + @@ -19857,7 +13750,7 @@

    Replacement Costs

    - @@ -19866,51 +13759,46 @@

    Replacement Costs

    -
    -

    Reputation and trust impact

    +
    +

    Remove Impact

    TermReplacementCostsRemoveConsequence Prefix risk
    LabelReplacement CostsRemove Consequence
    IRIhttps://w3id.org/dpv/risk#ReplacementCostshttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReplacement CostsControl that removes Consequence i.e. prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19921,23 +13809,20 @@

    Reputation and trust impact

    - + - - - - + - + @@ -19948,7 +13833,7 @@

    Reputation and trust impact

    - @@ -19957,52 +13842,46 @@

    Reputation and trust impact

    -
    -

    Retrieval of Deleted Data

    +
    +

    Remove Source

    TermReputationTrustImpactRemoveImpact Prefix risk
    LabelReputation and trust impactRemove Impact
    IRIhttps://w3id.org/dpv/risk#ReputationTrustImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReputation and trust impactControl that removes Impact i.e. prevents it from materialising
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -20013,23 +13892,20 @@

    Retrieval of Deleted Data

    - + - - - - + - + @@ -20040,7 +13916,7 @@

    Retrieval of Deleted Data

    - @@ -20049,54 +13925,40 @@

    Retrieval of Deleted Data

    -
    -

    Retrieval of Discarded Equipment

    +
    +

    Remuneration

    TermRetrievalDeletedDataRemoveSource Prefix risk
    LabelRetrieval of Deleted DataRemove Source
    IRIhttps://w3id.org/dpv/risk#RetrievalDeletedDatahttps://w3id.org/dpv/risk#RemoveSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRetrieval of Deleted DataControl that removes the risk source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -20105,28 +13967,28 @@

    Retrieval of Discarded Equipment

    - + - - - - + - + - + + + + - + @@ -20141,51 +14003,39 @@

    Retrieval of Discarded Equipment

    -
    -

    Reward

    +
    +

    Reputational Risk

    TermRetrievalDiscardedEquipmentRenumeration Prefix risk
    LabelRetrieval of Discarded EquipmentRemuneration
    IRIhttps://w3id.org/dpv/risk#RetrievalDiscardedEquipmenthttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRetrieval of Discarded EquipmentSomething that acts as or provides renumeration which is in monetary or financial form
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -20194,7 +14044,7 @@

    Reward

    - + @@ -20205,15 +14055,9 @@

    Reward

    - - - - + - - - - + @@ -20224,42 +14068,39 @@

    Reward

    TermRewardReputationalRisk Prefix risk
    LabelRewardReputational Risk
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionReward provided as compensation (as an impact)Risks and issues that affect the reputation of the organisation
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - - - - -
    -

    Risk Analysis

    + +
    +

    Reward

    - + - + - + - + - @@ -20272,34 +14113,34 @@

    Risk Analysis

    - + - - - - + - + - + + + + - + - @@ -20307,35 +14148,37 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Prevent Exercising of Rights

    TermRiskAnalysisReward Prefix risk
    LabelRisk AnalysisReward
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:FinancialImpact + → dpv:RiskConcept
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    SourceIEC 31010:2019
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20348,31 +14191,37 @@

    Risk Assessment

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20380,44 +14229,49 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Impact to Rights

    TermRiskAssessmentRightsExercisePrevention Prefix risk
    LabelRisk AssessmentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionAssessment of risk involving its identification, analysis, and evaluationSomething that acts as or causes Prevent Exercising of Rights
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Source
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + - @@ -20428,31 +14282,40 @@

    Risk Control

    - + + + + + - - - - - + + + + - + - - + + + + + + + + - @@ -20460,33 +14323,38 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Limitation of Rights

    TermRiskControlRightsImpact Prefix risk
    LabelRisk ControlImpact to Rights
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
    DefinitionControl that modifies riskSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -20498,31 +14366,37 @@

    Risk Management

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20531,36 +14405,36 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Violation of Rights

    TermRiskManagementRightsLimitation Prefix risk
    LabelRisk ManagementLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskSomething that acts as or causes Limitation of Rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Source
    Date Created2024-06-122022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20573,72 +14447,77 @@

    Risk Matrix

    - + - + + + + - - - - + - + - + + + + - + -
    TermRiskMatrixRightsViolation Prefix risk
    LabelRisk MatrixViolation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Something that acts as or causes Violation of Rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    + + + + - -
    -

    Risk Matrix 3x3

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -20652,20 +14531,23 @@

    Risk Matrix 3x3

    - + - + + + + - + @@ -20676,7 +14558,7 @@

    Risk Matrix 3x3

    - @@ -20684,38 +14566,35 @@

    Risk Matrix 3x3

    - -
    -

    Risk Matrix 5x5

    +
    +

    Risk Assessment

    TermRiskMatrix3x3RiskAnalysis Prefix risk
    LabelRisk Matrix 3x3Risk Analysis
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-172022-08-18
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - @@ -20728,31 +14607,31 @@

    Risk Matrix 5x5

    - + - + + + + - + - - - - + - @@ -20760,42 +14639,46 @@

    Risk Matrix 5x5

    - -
    -

    Risk Matrix 7x7

    +
    +

    Risk Control

    TermRiskMatrix5x5RiskAssessment Prefix risk
    LabelRisk Matrix 5x5Risk Assessment
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -20804,10 +14687,13 @@

    Risk Matrix 7x7

    - + + + + @@ -20817,18 +14703,15 @@

    Risk Matrix 7x7

    - + - - - - + - @@ -20836,23 +14719,23 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    +
    +

    Risk Management

    TermRiskMatrix7x7RiskControl Prefix risk
    LabelRisk Matrix 7x7Risk Control
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in DEX
    - + - + - + @@ -20865,11 +14748,7 @@

    Risk Source

    - - - - + @@ -20878,20 +14757,23 @@

    Risk Source

    - + - + + + + - + @@ -20908,37 +14790,35 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Risk Matrix

    TermRiskSourceRiskManagement Prefix risk
    LabelRisk SourceRisk Management
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-02-142024-06-12
    - + - + - + - + - @@ -20952,20 +14832,23 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + - + @@ -20976,7 +14859,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - @@ -20985,23 +14868,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Risk Matrix 3x3

    TermRM3x3S1L1RiskMatrix Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Risk Matrix
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2022-08-172024-02-14
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21013,8 +14896,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - @@ -21029,7 +14911,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - + @@ -21062,23 +14944,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Risk Matrix 5x5

    TermRM3x3S1L2RiskMatrix3x3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Risk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RiskMatrix3x3
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    - + - + - + @@ -21090,8 +14972,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - @@ -21106,7 +14987,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + @@ -21139,23 +15020,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Risk Matrix 7x7

    TermRM3x3S1L3RiskMatrix5x5 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Risk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RiskMatrix5x5
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    - + - + - + @@ -21167,8 +15048,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - @@ -21183,7 +15063,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - + @@ -21215,43 +15095,43 @@

    Low Risk (RM3x3 S:2 L:1)

    - -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Risk Source

    TermRM3x3S2L1RiskMatrix7x7 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Risk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RiskMatrix7x7
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    - + - + - + - + - - + + + + @@ -21260,7 +15140,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + @@ -21273,18 +15153,18 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + - - - - + + + + - @@ -21293,23 +15173,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRM3x3S2L2RiskSource Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Risk Source
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Date Modified2024-08-16
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21337,7 +15217,7 @@

    High Risk (RM3x3 S:2 L:3)

    - + @@ -21370,23 +15250,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRM3x3S2L3RM3x3S1L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Low Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM3x3S1L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21414,7 +15294,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - + @@ -21447,23 +15327,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRM3x3S3L1RM3x3S1L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM3x3S1L2
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -21491,7 +15371,7 @@

    High Risk (RM3x3 S:3 L:2)

    - + @@ -21524,23 +15404,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRM3x3S3L2RM3x3S1L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM3x3S1L3
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -21568,7 +15448,7 @@

    High Risk (RM3x3 S:3 L:3)

    - + @@ -21601,23 +15481,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRM3x3S3L3RM3x3S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM3x3S2L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21629,7 +15509,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - - + @@ -21678,23 +15558,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRM5x5S1L1RM3x3S2L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Moderate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM3x3S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21645,7 +15525,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -21706,7 +15586,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - - + @@ -21755,23 +15635,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRM5x5S1L2RM3x3S2L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21722,7 +15602,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -21783,7 +15663,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - - + @@ -21832,23 +15712,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRM5x5S1L3RM3x3S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21799,7 +15679,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -21860,7 +15740,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - - + @@ -21909,23 +15789,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRM5x5S1L4RM3x3S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21876,7 +15756,7 @@

    Low Risk (RM5x5 S:1 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -21937,7 +15817,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - - + @@ -21986,23 +15866,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRM5x5S1L5RM3x3S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM3x3S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21953,7 +15833,7 @@

    Low Risk (RM5x5 S:1 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22030,7 +15910,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -22063,23 +15943,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM5x5S2L1RM5x5S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S1L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22107,7 +15987,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -22140,23 +16020,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM5x5S2L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S1L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22184,7 +16064,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -22217,23 +16097,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM5x5S2L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S1L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22261,7 +16141,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -22294,23 +16174,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM5x5S2L4RM5x5S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S1L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22338,7 +16218,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -22371,23 +16251,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM5x5S2L5RM5x5S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S1L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -22415,7 +16295,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -22448,23 +16328,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM5x5S3L1RM5x5S2L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S2L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22492,7 +16372,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -22525,23 +16405,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM5x5S3L2RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S2L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -22569,7 +16449,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -22602,23 +16482,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM5x5S3L3RM5x5S2L3 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S2L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -22646,7 +16526,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -22679,23 +16559,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM5x5S3L4RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S2L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -22723,7 +16603,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -22756,23 +16636,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S3L5RM5x5S2L5 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -22800,7 +16680,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -22833,23 +16713,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S4L1RM5x5S3L1 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22877,7 +16757,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - + @@ -22910,23 +16790,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S4L2RM5x5S3L2 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22954,7 +16834,7 @@

    High Risk (RM5x5 S:4 L:3)

    - + @@ -22987,23 +16867,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S4L3RM5x5S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23031,7 +16911,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - + @@ -23064,23 +16944,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S4L4RM5x5S3L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23108,7 +16988,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - + @@ -23141,23 +17021,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S4L5RM5x5S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23185,7 +17065,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - + @@ -23218,23 +17098,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S5L1RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23262,7 +17142,7 @@

    High Risk (RM5x5 S:5 L:2)

    - + @@ -23295,23 +17175,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S5L2RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23339,7 +17219,7 @@

    High Risk (RM5x5 S:5 L:3)

    - + @@ -23372,23 +17252,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S5L3RM5x5S4L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23416,7 +17296,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - + @@ -23449,23 +17329,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S5L4RM5x5S4L4 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23493,7 +17373,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - + @@ -23526,23 +17406,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S5L5RM5x5S4L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23554,7 +17434,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - - + @@ -23603,23 +17483,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM7x7S1L1RM5x5S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23570,7 +17450,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23631,7 +17511,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - - + @@ -23680,23 +17560,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM7x7S1L2RM5x5S5L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23647,7 +17527,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -23708,7 +17588,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - - + @@ -23757,23 +17637,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM7x7S1L3RM5x5S5L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23724,7 +17604,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23785,7 +17665,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - - + @@ -23834,23 +17714,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM7x7S1L4RM5x5S5L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23801,7 +17681,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23862,7 +17742,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - - + @@ -23911,23 +17791,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM7x7S1L5RM5x5S5L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23878,7 +17758,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23955,7 +17835,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -23988,23 +17868,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM7x7S1L6RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S1L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24032,7 +17912,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -24065,23 +17945,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM7x7S1L7RM7x7S1L2 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S1L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24109,7 +17989,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -24142,23 +18022,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM7x7S2L1RM7x7S1L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S1L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24186,7 +18066,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -24219,23 +18099,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM7x7S2L2RM7x7S1L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S1L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24263,7 +18143,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -24296,23 +18176,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM7x7S2L3RM7x7S1L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S1L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -24340,7 +18220,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -24373,23 +18253,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S2L4RM7x7S1L6 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S1L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24417,7 +18297,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -24450,23 +18330,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM7x7S2L5RM7x7S1L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S1L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -24494,7 +18374,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -24527,23 +18407,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM7x7S2L6RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S2L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24571,7 +18451,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -24604,23 +18484,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM7x7S2L7RM7x7S2L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S2L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24648,7 +18528,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -24681,23 +18561,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM7x7S3L1RM7x7S2L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S2L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -24725,7 +18605,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -24758,23 +18638,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S3L2RM7x7S2L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -24802,7 +18682,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -24835,23 +18715,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S3L3RM7x7S2L5 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -24879,7 +18759,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -24912,23 +18792,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S3L4RM7x7S2L6 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -24956,7 +18836,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -24989,23 +18869,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S3L5RM7x7S2L7 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25033,7 +18913,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -25066,23 +18946,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S3L6RM7x7S3L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25110,7 +18990,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -25143,23 +19023,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S3L7RM7x7S3L2 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25187,7 +19067,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -25220,23 +19100,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S4L1RM7x7S3L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25264,7 +19144,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -25297,23 +19177,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S4L2RM7x7S3L4 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25341,7 +19221,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -25374,23 +19254,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S4L3RM7x7S3L5 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25418,7 +19298,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -25451,23 +19331,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S4L4RM7x7S3L6 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -25495,7 +19375,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -25528,23 +19408,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S4L5RM7x7S3L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -25572,7 +19452,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -25605,23 +19485,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S4L6RM7x7S4L1 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25649,7 +19529,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -25682,23 +19562,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S4L7RM7x7S4L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -25726,7 +19606,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -25759,23 +19639,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S5L1RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -25803,7 +19683,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -25836,23 +19716,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S5L2RM7x7S4L4 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -25880,7 +19760,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -25913,23 +19793,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S5L3RM7x7S4L5 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25957,7 +19837,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -25990,23 +19870,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S5L4RM7x7S4L6 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26034,7 +19914,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -26067,23 +19947,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S5L5RM7x7S4L7 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26111,7 +19991,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -26144,23 +20024,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S5L6RM7x7S5L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26188,7 +20068,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -26221,23 +20101,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S5L7RM7x7S5L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26265,7 +20145,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -26298,23 +20178,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S6L1RM7x7S5L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26342,7 +20222,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -26375,23 +20255,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S6L2RM7x7S5L4 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26419,7 +20299,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -26452,23 +20332,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S6L3RM7x7S5L5 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -26496,7 +20376,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -26529,23 +20409,23 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S6L4RM7x7S5L6 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -26573,7 +20453,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -26606,23 +20486,23 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S6L5RM7x7S5L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -26650,7 +20530,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + @@ -26683,23 +20563,23 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S6L6RM7x7S6L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26727,7 +20607,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -26760,23 +20640,23 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S6L7RM7x7S6L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -26804,7 +20684,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - + @@ -26837,23 +20717,23 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S7L1RM7x7S6L3 Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -26881,7 +20761,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -26914,23 +20794,23 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S7L2RM7x7S6L4 Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -26958,7 +20838,7 @@

    High Risk (RM7x7 S:7 L:3)

    - + @@ -26991,23 +20871,23 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S7L3RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27035,7 +20915,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + @@ -27068,23 +20948,23 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S7L4RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27112,7 +20992,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -27145,23 +21025,23 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S7L5RM7x7S6L7 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27189,7 +21069,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -27222,23 +21102,23 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S7L6RM7x7S7L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27266,7 +21146,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -27299,55 +21179,42 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Sabotage

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S7L7RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + - + - - - - - - - - - + + @@ -27356,17 +21223,14 @@

    Sabotage

    - + - - - - + @@ -27383,7 +21247,7 @@

    Sabotage

    - @@ -27392,55 +21256,42 @@

    Sabotage

    -
    -

    Scam

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermSabotageRM7x7S7L3 Prefix risk
    LabelSabotageHigh Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#RM7x7S7L3
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSabotageNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27449,17 +21300,14 @@

    Scam

    - + - - - - + @@ -27476,7 +21324,7 @@

    Scam

    - @@ -27485,53 +21333,42 @@

    Scam

    -
    -

    Security Breach

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermScamRM7x7S7L4 Prefix risk
    LabelScamVery High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#RM7x7S7L4
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionScamNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27540,17 +21377,14 @@

    Security Breach

    - + - - - - + @@ -27567,7 +21401,7 @@

    Security Breach

    - @@ -27576,59 +21410,42 @@

    Security Breach

    - - - - - -
    -

    Service Interruption

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermSecurityBreachRM7x7S7L5 Prefix risk
    LabelSecurity BreachExtremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#RM7x7S7L5
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSecurity BreachNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27637,17 +21454,14 @@

    Service Interruption

    - + - - - - + @@ -27664,7 +21478,7 @@

    Service Interruption

    - @@ -27673,55 +21487,42 @@

    Service Interruption

    -
    -

    Sexual Violence

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermServiceInterruptionRM7x7S7L6 Prefix risk
    LabelService InterruptionExtremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#ServiceInterruptionhttps://w3id.org/dpv/risk#RM7x7S7L6
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionService InterruptionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27730,17 +21531,14 @@

    Sexual Violence

    - + - - - - + @@ -27757,7 +21555,7 @@

    Sexual Violence

    - @@ -27766,47 +21564,40 @@

    Sexual Violence

    -
    -

    Share Risk

    +
    +

    Sabotage

    TermSexualViolenceRM7x7S7L7 Prefix risk
    LabelSexual ViolenceExtremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#RM7x7S7L7
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSexual ViolenceNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -27815,22 +21606,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -27839,7 +21636,7 @@

    Share Risk

    - @@ -27848,53 +21645,40 @@

    Share Risk

    -
    -

    Social Disadvantage

    +
    +

    Scam

    TermShareRiskSabotage Prefix risk
    LabelShare RiskSabotage
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27903,25 +21687,31 @@

    Social Disadvantage

    - + - + + + + - + - + + + + - + @@ -27936,47 +21726,40 @@

    Social Disadvantage

    -
    -

    Source Control

    +
    +

    Security Attack

    TermSocialDisadvantageScam Prefix risk
    LabelSocial DisadvantageScam
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSocial DisadvantageSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -27985,7 +21768,7 @@

    Source Control

    - + @@ -27996,20 +21779,14 @@

    Source Control

    - - - - + - - - - + - @@ -28018,55 +21795,40 @@

    Source Control

    -
    -

    Spam

    +
    +

    Security Breach

    TermSourceControlSecurityAttack Prefix risk
    LabelSource ControlSecurity Attack
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28075,7 +21837,7 @@

    Spam

    - + @@ -28084,7 +21846,7 @@

    Spam

    - + @@ -28093,7 +21855,10 @@

    Spam

    - + + + + @@ -28111,55 +21876,44 @@

    Spam

    -
    -

    Spoofing

    + + + + + +
    +

    Sexual Violence

    TermSpamSecurityBreach Prefix risk
    LabelSpamSecurity Breach
    IRIhttps://w3id.org/dpv/risk#Spamhttps://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpamSomething that acts as or causes Security Breach
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28168,7 +21922,7 @@

    Spoofing

    - + @@ -28177,7 +21931,7 @@

    Spoofing

    - + @@ -28186,7 +21940,10 @@

    Spoofing

    - + + + + @@ -28204,53 +21961,45 @@

    Spoofing

    -
    -

    Spying

    +
    +

    Share Risk

    TermSpoofingSexualViolence Prefix risk
    LabelSpoofingSexual Violence
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpoofingSomething that acts as or causes Sexual Violence
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28261,23 +22010,20 @@

    Spying

    - + - - - - + - + @@ -28288,7 +22034,7 @@

    Spying

    - @@ -28297,55 +22043,40 @@

    Spying

    -
    -

    Stalking

    +
    +

    Social Disadvantage

    TermSpyingShareRisk Prefix risk
    LabelSpyingShare Risk
    IRIhttps://w3id.org/dpv/risk#Spyinghttps://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSpyingRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28354,28 +22085,28 @@

    Stalking

    - + - - - - + - + - + + + + - + @@ -28390,85 +22121,59 @@

    Stalking

    -
    -

    System Failure

    +
    +

    Societal Health & Safety

    TermStalkingSocialDisadvantage Prefix risk
    LabelStalkingSocial Disadvantage
    IRIhttps://w3id.org/dpv/risk#Stalkinghttps://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionStalkingSomething that acts as or causes Social Disadvantage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -28482,54 +22187,39 @@

    System Failure

    -
    -

    System Intrusion

    +
    +

    Societal Risk

    TermSystemFailureSocietalHealthSafety Prefix risk
    LabelSystem FailureSocietal Health & Safety
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem Failure
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28538,29 +22228,20 @@

    System Intrusion

    - + - - - - + - - - - + - - - - + @@ -28574,52 +22255,45 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Source Control

    TermSystemIntrusionSocietalRisk Prefix risk
    LabelSystem IntrusionSocietal Risk
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem IntrusionRisks and issues that affect or have the potential to affect society at large or specific groups in society
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28630,23 +22304,20 @@

    System Malfunction

    - + - - - - + - + @@ -28657,7 +22328,7 @@

    System Malfunction

    - @@ -28666,55 +22337,44 @@

    System Malfunction

    -
    -

    Terrorism

    +
    +

    Spoofing

    TermSystemMalfunctionSourceControl Prefix risk
    LabelSystem MalfunctionSource Control
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSystem MalfunctionRisk Mitigation Measure that controls the Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - - - - - + + @@ -28723,7 +22383,7 @@

    Terrorism

    - + @@ -28732,7 +22392,7 @@

    Terrorism

    - + @@ -28741,7 +22401,10 @@

    Terrorism

    - + + + + @@ -28759,55 +22422,40 @@

    Terrorism

    -
    -

    Theft

    +
    +

    System Failure

    TermTerrorismSpoofing Prefix risk
    LabelTerrorismSpoofing
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTerrorismSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28816,16 +22464,19 @@

    Theft

    - + - + + + + - + @@ -28834,7 +22485,10 @@

    Theft

    - + + + + @@ -28852,55 +22506,40 @@

    Theft

    -
    -

    Theft of Equipment

    +
    +

    System Intrusion

    TermTheftSystemFailure Prefix risk
    LabelTheftSystem Failure
    IRIhttps://w3id.org/dpv/risk#Thefthttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheftSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28909,7 +22548,7 @@

    Theft of Equipment

    - + @@ -28918,7 +22557,7 @@

    Theft of Equipment

    - + @@ -28927,7 +22566,10 @@

    Theft of Equipment

    - + + + + @@ -28945,55 +22587,40 @@

    Theft of Equipment

    -
    -

    Theft of Media

    +
    +

    System Malfunction

    TermTheftEquipmentSystemIntrusion Prefix risk
    LabelTheft of EquipmentSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#TheftEquipmenthttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of EquipmentSomething that acts as or causes System Intrusion
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29002,9 +22629,12 @@

    Theft of Media

    - + - + + + + @@ -29020,7 +22650,10 @@

    Theft of Media

    - + + + + @@ -29038,54 +22671,40 @@

    Theft of Media

    -
    -

    Third Party Operation Disruption

    +
    +

    Terrorism

    TermTheftMediaSystemMalfunction Prefix risk
    LabelTheft of MediaSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#TheftMediahttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of MediaSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29094,7 +22713,7 @@

    Third Party Operation Disruption

    - + @@ -29112,7 +22731,10 @@

    Third Party Operation Disruption

    - + + + + @@ -29158,6 +22780,7 @@

    Threat

    @@ -29305,31 +22928,17 @@

    Unauthorised Access to Premises

    - + - - - - - - - - - + + @@ -29338,7 +22947,7 @@

    Unauthorised Access to Premises

    - + @@ -29356,7 +22965,10 @@

    Unauthorised Access to Premises

    - + + + + @@ -29374,54 +22986,40 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Code Access

    +
    +

    Unauthorised Activity

    TermThirdPartyOperationDisruptionTerrorism Prefix risk
    LabelThird Party Operation DisruptionTerrorism
    IRIhttps://w3id.org/dpv/risk#ThirdPartyOperationDisruptionhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionThird Party Operation DisruptionSomething that acts as or causes Terrorism
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Broader/Parent types risk:RiskSource + → dpv:RiskConcept
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Access to PremisesSomething that acts as or causes Unauthorised Access to Premises
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29430,29 +23028,20 @@

    Unauthorised Code Access

    - + - - - - + - - - - + - - - - + @@ -29466,54 +23055,40 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Unauthorised Code Access

    TermUnauthorisedCodeAccessUnauthorisedActivity Prefix risk
    LabelUnauthorised Code AccessUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code AccessSomething that acts as or causes Unauthorised Activity
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29522,7 +23097,7 @@

    Unauthorised Code Disclosure

    - + @@ -29540,7 +23115,10 @@

    Unauthorised Code Disclosure

    - + + + + @@ -29558,54 +23136,40 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Unauthorised Code Disclosure

    TermUnauthorisedCodeDisclosureUnauthorisedCodeAccess Prefix risk
    LabelUnauthorised Code DisclosureUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code DisclosureSomething that acts as or causes Unauthorised Code Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29614,7 +23178,7 @@

    Unauthorised Code Modification

    - + @@ -29632,7 +23196,10 @@

    Unauthorised Code Modification

    - + + + + @@ -29650,54 +23217,40 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Unauthorised Code Modification

    TermUnauthorisedCodeModificationUnauthorisedCodeDisclosure Prefix risk
    LabelUnauthorised Code ModificationUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code ModificationSomething that acts as or causes Unauthorised Code Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29706,7 +23259,7 @@

    Unauthorised Data Access

    - + @@ -29715,7 +23268,7 @@

    Unauthorised Data Access

    - + @@ -29724,7 +23277,10 @@

    Unauthorised Data Access

    - + + + + @@ -29742,54 +23298,40 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Unauthorised Data Access

    TermUnauthorisedDataAccessUnauthorisedCodeModification Prefix risk
    LabelUnauthorised Data AccessUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data AccessSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29798,7 +23340,7 @@

    Unauthorised Data Disclosure

    - + @@ -29807,7 +23349,7 @@

    Unauthorised Data Disclosure

    - + @@ -29816,7 +23358,10 @@

    Unauthorised Data Disclosure

    - + + + + @@ -29834,55 +23379,40 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Unauthorised Data Disclosure

    TermUnauthorisedDataDisclosureUnauthorisedDataAccess Prefix risk
    LabelUnauthorised Data DisclosureUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data DisclosureSomething that acts as or causes Unauthorised Data Access
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29891,7 +23421,7 @@

    Unauthorised Data Modification

    - + @@ -29900,7 +23430,7 @@

    Unauthorised Data Modification

    - + @@ -29909,7 +23439,10 @@

    Unauthorised Data Modification

    - + + + + @@ -29927,55 +23460,40 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Impersonation

    +
    +

    Unauthorised Data Modification

    TermUnauthorisedDataModificationUnauthorisedDataDisclosure Prefix risk
    LabelUnauthorised Data ModificationUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data ModificationSomething that acts as or causes Unauthorised Data Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29984,7 +23502,7 @@

    Unauthorised Impersonation

    - + @@ -29993,7 +23511,7 @@

    Unauthorised Impersonation

    - + @@ -30002,7 +23520,10 @@

    Unauthorised Impersonation

    - + + + + @@ -30043,31 +23564,17 @@

    Unauthorised Information Disclosure

    - + - - - - - - - - - + + @@ -30076,7 +23583,7 @@

    Unauthorised Information Disclosure

    - + @@ -30094,7 +23601,10 @@

    Unauthorised Information Disclosure

    - + + + + @@ -30135,31 +23645,17 @@

    Unauthorised Re-Identification

    - + - - - - - - - - - + + @@ -30168,7 +23664,7 @@

    Unauthorised Re-Identification

    - + @@ -30183,7 +23679,10 @@

    Unauthorised Re-Identification

    - + + + + @@ -30224,31 +23723,17 @@

    Unauthorised Resource Use

    - + - - - - - - - - - + + @@ -30257,7 +23742,7 @@

    Unauthorised Resource Use

    - + @@ -30275,7 +23760,10 @@

    Unauthorised Resource Use

    - + + + + @@ -30316,31 +23804,17 @@

    Unauthorised System Access

    - + - - - - - - - - - + + @@ -30349,7 +23823,7 @@

    Unauthorised System Access

    - + @@ -30367,7 +23841,10 @@

    Unauthorised System Access

    - + + + + @@ -30408,31 +23885,17 @@

    Unauthorised System Modification

    - + - - - - - - - - - + + @@ -30441,7 +23904,7 @@

    Unauthorised System Modification

    - + @@ -30459,99 +23922,10 @@

    Unauthorised System Modification

    - - - - - - - - - - - - -
    TermUnauthorisedImpersonationUnauthorisedDataModification Prefix risk
    LabelUnauthorised ImpersonationUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedImpersonationhttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised ImpersonationSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Information DisclosureSomething that acts as or causes Unauthorised Information Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Reidentification - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Re-IdentificationSomething that acts as or causes Unauthorised Re-Identification
    Date Created 2022-08-19
    Date Modified2024-08-16
    Contributors Georg P. Krog
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Resource UseSomething that acts as or causes Unauthorised Resource Use
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System AccessSomething that acts as or causes Unauthorised System Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System ModificationSomething that acts as or causes Unauthorised System Modification
    Date Created 2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Unknown Vulnerability Exploited

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + - - - - - - - - @@ -30592,31 +23966,17 @@

    Unwanted Code Deletion

    - + - - - - - - - - - + + @@ -30625,7 +23985,7 @@

    Unwanted Code Deletion

    - + @@ -30643,7 +24003,10 @@

    Unwanted Code Deletion

    - + + + + @@ -30684,31 +24047,17 @@

    Unwanted Data Deletion

    - + - - - - - - - - - - - + + + + + @@ -30717,7 +24066,7 @@

    Unwanted Data Deletion

    - + @@ -30735,7 +24084,10 @@

    Unwanted Data Deletion

    - + + + + @@ -30776,31 +24128,17 @@

    Unwanted Disclosure of Data

    - + - - - - - - - - - + + @@ -30809,7 +24147,7 @@

    Unwanted Disclosure of Data

    - + @@ -30827,7 +24165,10 @@

    Unwanted Disclosure of Data

    - + + + + @@ -30845,54 +24186,39 @@

    Unwanted Disclosure of Data

    -
    -

    Vandalism

    +
    +

    User Risks

    TermUnknownVulnerabilityExploitedPrefixrisk
    LabelUnknown Vulnerability Exploited
    IRIhttps://w3id.org/dpv/risk#UnknownVulnerabilityExploited
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnknown Vulnerability Exploited
    SourceENISA Reference Incident Classification Taxonomy 2018Date Modified2024-08-16
    Date Created2022-08-17
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Code DeletionSomething that acts as or causes Unwanted Code Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionUnwanted Data DeletionSomething that acts as or causes Unwanted Data Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Disclosure of DataSomething that acts as or causes Unwanted Disclosure of Data
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -30901,29 +24227,20 @@

    Vandalism

    - + - - - - + - - - - + - - - - + @@ -31453,54 +24770,40 @@

    Very Low Severity

    -
    -

    Violation of Code of Conduct

    +
    +

    Violating Code of Conduct

    TermVandalismUserRisks Prefix risk
    LabelVandalismUser Risks
    IRIhttps://w3id.org/dpv/risk#Vandalismhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVandalismConcepts associated with risks that arise due to User or Human use
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31509,9 +24812,12 @@

    Violation of Code of Conduct

    - + - + + + + @@ -31527,7 +24833,10 @@

    Violation of Code of Conduct

    - + + + + @@ -31545,54 +24854,40 @@

    Violation of Code of Conduct

    -
    -

    Violation of Contractual Obligations

    +
    +

    Violation of Contractual Obligation

    TermViolationCodeConductViolatingCodeOfConduct Prefix risk
    LabelViolation of Code of ConductViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#ViolationCodeConducthttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Code of ConductSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31601,9 +24896,12 @@

    Violation of Contractual Obligations

    - + - + + + + @@ -31619,7 +24917,10 @@

    Violation of Contractual Obligations

    - + + + + @@ -31637,54 +24938,40 @@

    Violation of Contractual Obligations

    -
    -

    Violation of Ethical Code

    +
    +

    Violating Ethics Code

    TermViolationContractualObligationsViolatingContractualObligation Prefix risk
    LabelViolation of Contractual ObligationsViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#ViolationContractualObligationshttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Contractual ObligationsSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31693,9 +24980,12 @@

    Violation of Ethical Code

    - + - + + + + @@ -31711,7 +25001,10 @@

    Violation of Ethical Code

    - + + + + @@ -31729,55 +25022,40 @@

    Violation of Ethical Code

    -
    -

    Violation of Rights

    +
    +

    Violation of Legal Obligations

    TermViolationEthicalCodeViolatingEthicsCode Prefix risk
    LabelViolation of Ethical CodeViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#ViolationEthicalCodehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Ethical CodeSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31786,25 +25064,34 @@

    Violation of Rights

    - + - + + + + - + + + + - + - + + + + - + @@ -31819,54 +25106,40 @@

    Violation of Rights

    -
    -

    Violation of Regulatory Obligations

    +
    +

    Violating Policy

    TermViolationOfRightsViolatingLegalObligation Prefix risk
    LabelViolation of RightsViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ViolationOfRightshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of RightsSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31875,29 +25148,20 @@

    Violation of Regulatory Obligations

    - + - - - - + - - - - + - - - - + @@ -31911,13 +25175,13 @@

    Violation of Regulatory Obligations

    -
    +

    Violation of Statutory Obligations

    TermViolationRegulatoryObligationsViolatingPolicy Prefix risk
    LabelViolation of Regulatory ObligationsViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolationRegulatoryObligationshttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Regulatory ObligationsSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + @@ -31927,38 +25191,24 @@

    Violation of Statutory Obligations

    - + - + - - - - - - - - - + + @@ -31967,9 +25217,12 @@

    Violation of Statutory Obligations

    - + - + + + + @@ -31985,7 +25238,10 @@

    Violation of Statutory Obligations

    - + + + + @@ -32002,47 +25258,40 @@

    Violation of Statutory Obligations

    -
    -

    Vulnerability

    + +
    +

    Violence against children

    TermViolationStatutoryObligationsViolatingStatutoryObligations Prefix risk
    IRIhttps://w3id.org/dpv/risk#ViolationStatutoryObligationshttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Statutory ObligationsSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + + + + - - - - - - - - - + + @@ -32051,28 +25300,40 @@

    Vulnerability

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -32080,53 +25341,45 @@

    Vulnerability

    - -
    -

    Vulnerability Created

    +
    +

    Vulnerability

    TermVulnerabilityViolenceAgainstChildren Prefix risk
    LabelVulnerabilityViolence against children
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk +
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - + - - @@ -32137,34 +25390,28 @@

    Vulnerability Created

    - + - - - - - + + - + - - - - + - @@ -32173,54 +25420,40 @@

    Vulnerability Created

    -
    -

    Vulnerability Exploited

    +
    +

    Vulnerability Created

    TermVulnerabilityCreatedVulnerability Prefix risk
    LabelVulnerability CreatedVulnerability
    IRIhttps://w3id.org/dpv/risk#VulnerabilityCreatedhttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource + risk:isExploitedBy, + risk:isVulnerabilityOf
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability
    DefinitionVulnerability CreatedIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - + + @@ -32229,7 +25462,7 @@

    Vulnerability Exploited

    - + @@ -32238,7 +25471,7 @@

    Vulnerability Exploited

    - + @@ -32247,7 +25480,10 @@

    Vulnerability Exploited

    - + + + + @@ -32378,84 +25614,6 @@

    Properties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32653,18 +25811,6 @@

    caused by vulnerability

    - - - - - - - - - - - - @@ -32693,54 +25839,6 @@

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32871,15 +25969,6 @@

    exploits vulnerability

    - - - - - - - - - @@ -33275,6 +26364,8 @@

    has vulnerability

    + + @@ -33287,15 +26378,6 @@

    has vulnerability

    - - - - - - - - - @@ -33487,72 +26569,21 @@

    is vulnerability of

    - - - - - - - - - - - - -
    TermVulnerabilityExploitedVulnerabilityCreated Prefix risk
    LabelVulnerability ExploitedVulnerability Created
    IRIhttps://w3id.org/dpv/risk#VulnerabilityExploitedhttps://w3id.org/dpv/risk#VulnerabilityCreated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:InternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVulnerability ExploitedSomething that acts as or causes Vulnerability Created
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + Date Created + 2024-02-14 + + + + + + + See More: + section CORE in RISK + + + + +
    @@ -34194,24 +27225,6 @@

    refers to risk

    - - - - - - - - - - - - - - - - - - @@ -34323,81 +27336,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34423,17 +27361,9 @@

    External

    - - - - - - - - @@ -34445,7 +27375,6 @@

    External

    - @@ -34454,17 +27383,14 @@

    External

    - - - @@ -34491,12 +27417,9 @@

    External

    - - - @@ -34510,59 +27433,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34577,10 +27447,6 @@

    External

    - - - - @@ -34589,11 +27455,6 @@

    External

    - - - - - @@ -34617,7 +27478,6 @@

    External

    - @@ -34659,26 +27519,20 @@

    External

    - - - - - - @@ -34767,46 +27621,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34815,10 +27629,6 @@

    External

    - - - - @@ -34830,10 +27640,8 @@

    External

    - - @@ -35280,28 +28088,13 @@

    External

    - - - - - - - - - - - - - - - @@ -35430,9 +28223,6 @@

    External

    - - - diff --git a/2.1-dev/risk/risk-owl.html b/2.1-dev/risk/risk-owl.html index 2e565437b..117288ffd 100644 --- a/2.1-dev/risk/risk-owl.html +++ b/2.1-dev/risk/risk-owl.html @@ -421,75 +421,6 @@

    Classes

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -1230,26 +1161,25 @@

    7 Severity Levels

    - -
    -

    Abusive Content Utilisation

    +
    +

    Accidental Incident

    - + - + @@ -1258,31 +1188,19 @@

    Abusive Content Utilisation

    - - - - - + - @@ -1293,57 +1211,52 @@

    Abusive Content Utilisation

    - + - - - - + - + - - - - + - +
    TermAbusiveContentUtilisationAccidentalIncident Prefix risk-owl
    LabelAbusive Content UtilisationAccidental Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#AbusiveContentUtilisation
    - https://w3id.org/dpv/risk#AbusiveContentUtilisation + https://w3id.org/dpv/risk/owl/#AccidentalIncident
    + https://w3id.org/dpv/risk#AccidentalIncident
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:Incident + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:hasIncident
    DefinitionAbusive Content UtilisationIncident caused due to accidental actions arising from human or human-controlled situations
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    -
    -

    Accidental Incident

    + +
    +

    Accidental Misuse

    - + - + @@ -1352,20 +1265,18 @@

    Accidental Incident

    - - - - - + @@ -1374,7 +1285,7 @@

    Accidental Incident

    - + @@ -1385,15 +1296,12 @@

    Accidental Incident

    - - - - + - +
    TermAccidentalIncidentAccidentalMisuse Prefix risk-owl
    LabelAccidental IncidentAccidental Misuse
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#AccidentalIncident
    - https://w3id.org/dpv/risk#AccidentalIncident + https://w3id.org/dpv/risk/owl/#AccidentalMisuse
    + https://w3id.org/dpv/risk#AccidentalMisuse
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Incident + risk-owl:UserRisks + → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsAccidental Misuse
    Date Created2024-05-19
    Documented inRisk IncidentRisk Risk-consequences
    @@ -1401,25 +1309,25 @@

    Accidental Incident

    -
    -

    Attack on Private Life

    +
    +

    Authorisation Failure

    - + - + @@ -1428,33 +1336,18 @@

    Attack on Private Life

    - - - - - - - - - + + @@ -1463,7 +1356,7 @@

    Attack on Private Life

    - + @@ -1472,7 +1365,7 @@

    Attack on Private Life

    - + @@ -1481,7 +1374,10 @@

    Attack on Private Life

    - + + + + @@ -1496,25 +1392,25 @@

    Attack on Private Life

    -
    -

    Authorisation Failure

    +
    +

    None

    TermAttackonPrivateLifeAuthorisationFailure Prefix risk-owl
    LabelAttack on Private LifeAuthorisation Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#AttackonPrivateLife
    - https://w3id.org/dpv/risk#AttackonPrivateLife + https://w3id.org/dpv/risk/owl/#AuthorisationFailure
    + https://w3id.org/dpv/risk#AuthorisationFailure
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionAttack on Private LifeSomething that acts as or causes Authorisation Failure
    SourceISO/IEC 27005:2018ENISa Trust Services Security Incidents 2021
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -1523,63 +1419,39 @@

    Authorisation Failure

    - - - - - - - - - + + - - - - + - - - - + - - - - + + - - - - @@ -1622,6 +1494,7 @@

    Availability Incident

    @@ -1777,27 +1650,18 @@

    Benefit

    - - - - - - - - - + + @@ -1806,7 +1670,7 @@

    Benefit

    - + @@ -1821,7 +1685,10 @@

    Benefit

    - + + + + @@ -1863,33 +1730,18 @@

    Blackmail

    - - - - - - - - - + + @@ -1898,7 +1750,7 @@

    Blackmail

    - + @@ -1916,7 +1768,10 @@

    Blackmail

    - + + + + @@ -1958,32 +1813,18 @@

    Brute Force Authorisations

    - - - - - - - - - + + @@ -1992,7 +1833,7 @@

    Brute Force Authorisations

    - + @@ -2010,7 +1851,10 @@

    Brute Force Authorisations

    - + + + + @@ -2025,25 +1869,29 @@

    Brute Force Authorisations

    -
    -

    Business disruption

    + + + + +
    +

    Change Consequence

    TermAuthorisationFailureAvailabilityBreach Prefix risk-owl
    LabelAuthorisation FailureNone
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#AuthorisationFailure
    - https://w3id.org/dpv/risk#AuthorisationFailure + https://w3id.org/dpv/risk/owl/#AvailabilityBreach
    + https://w3id.org/dpv/risk#AvailabilityBreach
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionAuthorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    Sub-class of risk-owl:Incident + → dpv-owl:RiskConcept
    Type rdfs:Class , owl:Class - , dpv-owl:Impact + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Impact - → dpv-owl:Consequence + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasImpactOn -
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact -
    DefinitionImpact(s) that acts as or causes benefitsSomething that acts as or causes benefits
    Date Created 2022-03-23
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionBlackmailSomething that acts as or causes Blackmail
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionBrute Force AuthorisationsSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -2052,30 +1900,24 @@

    Business disruption

    - - - - - + - @@ -2086,23 +1928,20 @@

    Business disruption

    - + - - - - - - - + + + + - + @@ -2111,7 +1950,7 @@

    Business disruption

    - +
    TermBusinessdisruptionChangeConsequence Prefix risk-owl
    LabelBusiness disruptionChange Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Businessdisruption
    - https://w3id.org/dpv/risk#Businessdisruption + https://w3id.org/dpv/risk/owl/#ChangeConsequence
    + https://w3id.org/dpv/risk#ChangeConsequence
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ConsequenceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionBusiness disruptionControl that changes Consequence
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -2119,25 +1958,25 @@

    Business disruption

    -
    -

    Business impact

    +
    +

    Change Impact

    - + - + @@ -2146,29 +1985,24 @@

    Business impact

    - - - - - + - @@ -2179,23 +2013,20 @@

    Business impact

    - + - - - - + - + @@ -2204,7 +2035,7 @@

    Business impact

    - +
    TermBusinessImpactChangeImpact Prefix risk-owl
    LabelBusiness impactChange Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#BusinessImpact
    - https://w3id.org/dpv/risk#BusinessImpact + https://w3id.org/dpv/risk/owl/#ChangeImpact
    + https://w3id.org/dpv/risk#ChangeImpact
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of dpv-owl:Risk + risk-owl:ImpactControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionBusiness impactControl that changes Impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -2212,25 +2043,25 @@

    Business impact

    -
    -

    Business Performance Impairment

    +
    +

    Coercion

    - + - + @@ -2239,32 +2070,18 @@

    Business Performance Impairment

    - - - - - - - - - + + @@ -2273,7 +2090,7 @@

    Business Performance Impairment

    - + @@ -2282,7 +2099,7 @@

    Business Performance Impairment

    - + @@ -2291,7 +2108,10 @@

    Business Performance Impairment

    - + + + + @@ -2306,29 +2126,25 @@

    Business Performance Impairment

    - - - - -
    -

    Change Consequence

    +
    +

    Compensation

    TermBusinessPerformanceImpairmentCoercion Prefix risk-owl
    LabelBusiness Performance ImpairmentCoercion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#BusinessPerformanceImpairment
    - https://w3id.org/dpv/risk#BusinessPerformanceImpairment + https://w3id.org/dpv/risk/owl/#Coercion
    + https://w3id.org/dpv/risk#Coercion
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionBusiness Performance ImpairmentSomething that acts as or causes Coercion
    SourceISO/IEC 27005:2018ENISA Threat Taxonomy 2016
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -2337,26 +2153,18 @@

    Change Consequence

    - - - - - + @@ -2365,7 +2173,7 @@

    Change Consequence

    - + @@ -2378,16 +2186,19 @@

    Change Consequence

    - + - + + + + - + - +
    TermChangeConsequenceCompensation Prefix risk-owl
    LabelChange ConsequenceCompensation
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ChangeConsequence
    - https://w3id.org/dpv/risk#ChangeConsequence + https://w3id.org/dpv/risk/owl/#Compensation
    + https://w3id.org/dpv/risk#Compensation
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:ConsequenceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that changes ConsequenceSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -2395,25 +2206,25 @@

    Change Consequence

    -
    -

    Change Impact

    +
    +

    Component Failure

    - + - + @@ -2422,26 +2233,18 @@

    Change Impact

    - - - - - + @@ -2450,9 +2253,12 @@

    Change Impact

    - + - + + + + @@ -2461,18 +2267,12 @@

    Change Impact

    - - - - + + - - - - - +
    TermChangeImpactComponentFailure Prefix risk-owl
    LabelChange ImpactComponent Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ChangeImpact
    - https://w3id.org/dpv/risk#ChangeImpact + https://w3id.org/dpv/risk/owl/#ComponentFailure
    + https://w3id.org/dpv/risk#ComponentFailure
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:ImpactControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that changes ImpactSomething that acts as or causes Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -2480,25 +2280,25 @@

    Change Impact

    -
    -

    Child Violence

    +
    +

    Component Malfunction

    - + - + @@ -2507,33 +2307,18 @@

    Child Violence

    - - - - - - - - - + + @@ -2542,29 +2327,23 @@

    Child Violence

    - + - + + + + - - - - + - - - - + + - - - - @@ -2575,25 +2354,25 @@

    Child Violence

    -
    -

    Citizens impact

    +
    +

    Compromise Account

    TermChildViolenceComponentMalfunction Prefix risk-owl
    LabelChild ViolenceComponent Malfunction
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ChildViolence
    - https://w3id.org/dpv/risk#ChildViolence + https://w3id.org/dpv/risk/owl/#ComponentMalfunction
    + https://w3id.org/dpv/risk#ComponentMalfunction
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionChild ViolenceSomething that acts as or causes Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -2602,31 +2381,18 @@

    Citizens impact

    - - - - - - - - - + + @@ -2635,7 +2401,7 @@

    Citizens impact

    - + @@ -2644,7 +2410,7 @@

    Citizens impact

    - + @@ -2653,7 +2419,10 @@

    Citizens impact

    - + + + + @@ -2668,25 +2437,25 @@

    Citizens impact

    -
    -

    Coercion

    +
    +

    Compromise Account Credentials

    TermCitizensImpactCompromiseAccount Prefix risk-owl
    LabelCitizens impactCompromise Account
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CitizensImpact
    - https://w3id.org/dpv/risk#CitizensImpact + https://w3id.org/dpv/risk/owl/#CompromiseAccount
    + https://w3id.org/dpv/risk#CompromiseAccount
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCitizens impactSomething that acts as or causes a compromised account that is then used by the compromiser
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -2695,33 +2464,18 @@

    Coercion

    - - - - - - - - - + + @@ -2730,7 +2484,7 @@

    Coercion

    - + @@ -2739,7 +2493,7 @@

    Coercion

    - + @@ -2748,7 +2502,10 @@

    Coercion

    - + + + + @@ -2763,25 +2520,25 @@

    Coercion

    -
    -

    Compensation

    +
    +

    Confidentiality Breach

    TermCoercionCompromiseAccountCredentials Prefix risk-owl
    LabelCoercionCompromise Account Credentials
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Coercion
    - https://w3id.org/dpv/risk#Coercion + https://w3id.org/dpv/risk/owl/#CompromiseAccountCredentials
    + https://w3id.org/dpv/risk#CompromiseAccountCredentials
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCoercionSomething that acts as or causes Account Credentials to be compromised
    SourceENISA Threat Taxonomy 2016ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -2790,28 +2547,20 @@

    Compensation

    - - - - - - - - - + + @@ -2820,25 +2569,31 @@

    Compensation

    - + - + + + + - + - + + + + - + @@ -2849,26 +2604,25 @@

    Compensation

    - -
    -

    Compliance impact

    +
    +

    Confidentiality Incident

    TermCompensationConfidentialityBreach Prefix risk-owl
    LabelCompensationConfidentiality Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Compensation
    - https://w3id.org/dpv/risk#Compensation + https://w3id.org/dpv/risk/owl/#ConfidentialityBreach
    + https://w3id.org/dpv/risk#ConfidentialityBreach
    Type rdfs:Class , owl:Class - , dpv-owl:Impact + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Benefit - → dpv-owl:Impact - → dpv-owl:Consequence + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasImpactOn -
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact -
    DefinitionCompensation provided (as an impact)Something that acts as or causes Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented in
    - + - + @@ -2877,29 +2631,19 @@

    Compliance impact

    - - - - - + - @@ -2910,32 +2654,26 @@

    Compliance impact

    - + - - - - + - + - - - - + - +
    TermComplianceImpactConfidentialityIncident Prefix risk-owl
    LabelCompliance impactConfidentiality Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ComplianceImpact
    - https://w3id.org/dpv/risk#ComplianceImpact + https://w3id.org/dpv/risk/owl/#ConfidentialityIncident
    + https://w3id.org/dpv/risk#ConfidentialityIncident
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of dpv-owl:Risk + risk-owl:Incident + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:hasIncident
    DefinitionCompliance impactIncident where the confidentiality of information or system has been affected
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -2943,25 +2681,25 @@

    Compliance impact

    -
    -

    Compromise Account

    +
    +

    Consequence Control

    - + - + @@ -2970,31 +2708,23 @@

    Compromise Account

    - - - - - + - @@ -3005,23 +2735,20 @@

    Compromise Account

    - + - - - - + - + @@ -3030,7 +2757,7 @@

    Compromise Account

    - +
    TermCompromiseAccountConsequenceControl Prefix risk-owl
    LabelCompromise AccountConsequence Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CompromiseAccount
    - https://w3id.org/dpv/risk#CompromiseAccount + https://w3id.org/dpv/risk/owl/#ConsequenceControl
    + https://w3id.org/dpv/risk#ConsequenceControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionCompromise AccountRisk Mitigation Measure that controls the Consequences
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -3038,25 +2765,25 @@

    Compromise Account

    -
    -

    Compromise Account Credentials

    +
    +

    Containment Control

    - + - + @@ -3065,31 +2792,23 @@

    Compromise Account Credentials

    - - - - - + - @@ -3100,32 +2819,26 @@

    Compromise Account Credentials

    - + - - - - + - + - - - - + - +
    TermCompromiseAccountCredentialsContainmentControl Prefix risk-owl
    LabelCompromise Account CredentialsContainment Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CompromiseAccountCredentials
    - https://w3id.org/dpv/risk#CompromiseAccountCredentials + https://w3id.org/dpv/risk/owl/#ContainmentControl
    + https://w3id.org/dpv/risk#ContainmentControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionCompromise Account CredentialsControl to contain event
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -3133,25 +2846,25 @@

    Compromise Account Credentials

    -
    -

    Compromise Account Security

    +
    +

    Copyright Violation

    - + - + @@ -3160,33 +2873,18 @@

    Compromise Account Security

    - - - - - - - - - + + @@ -3195,7 +2893,7 @@

    Compromise Account Security

    - + @@ -3213,7 +2911,10 @@

    Compromise Account Security

    - + + + + @@ -3225,28 +2926,29 @@

    Compromise Account Security

    TermCompromiseAccountSecurityCopyrightViolation Prefix risk-owl
    LabelCompromise Account SecurityCopyright Violation
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CompromiseAccountSecurity
    - https://w3id.org/dpv/risk#CompromiseAccountSecurity + https://w3id.org/dpv/risk/owl/#CopyrightViolation
    + https://w3id.org/dpv/risk#CopyrightViolation
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCompromise Account SecuritySomething that acts as or causes Copyright Violation
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    + + - -
    -

    Confidentiality Breach

    +
    +

    Cross-Border Incident

    - + - + @@ -3255,30 +2957,19 @@

    Confidentiality Breach

    - - - - - + - @@ -3289,57 +2980,52 @@

    Confidentiality Breach

    - + - - - - + - + - - - - + - +
    TermConfidentialityBreachCrossBorderIncident Prefix risk-owl
    LabelConfidentiality BreachCross-Border Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ConfidentialityBreach
    - https://w3id.org/dpv/risk#ConfidentialityBreach + https://w3id.org/dpv/risk/owl/#CrossBorderIncident
    + https://w3id.org/dpv/risk#CrossBorderIncident
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:Incident + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:hasIncident
    DefinitionConfidentiality BreachIncident involving cross-border or multiple jurisdictions
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    -
    -

    Confidentiality Incident

    + +
    +

    Cryptojacking

    - + - + @@ -3348,20 +3034,18 @@

    Confidentiality Incident

    - - - - - + @@ -3370,26 +3054,35 @@

    Confidentiality Incident

    - + - + + + + - + - - + + + + + + + + - +
    TermConfidentialityIncidentCryptojacking Prefix risk-owl
    LabelConfidentiality IncidentCryptojacking
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ConfidentialityIncident
    - https://w3id.org/dpv/risk#ConfidentialityIncident + https://w3id.org/dpv/risk/owl/#Cryptojacking
    + https://w3id.org/dpv/risk#Cryptojacking
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Incident + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affectedSomething that acts as or causes Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-consequences
    @@ -3397,25 +3090,25 @@

    Confidentiality Incident

    -
    -

    Consequence Control

    +
    +

    Damage

    - + - + @@ -3424,25 +3117,18 @@

    Consequence Control

    - - - - - + @@ -3451,7 +3137,7 @@

    Consequence Control

    - + @@ -3464,16 +3150,19 @@

    Consequence Control

    - + - + + + + - +
    TermConsequenceControlDamage Prefix risk-owl
    LabelConsequence ControlDamage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ConsequenceControl
    - https://w3id.org/dpv/risk#ConsequenceControl + https://w3id.org/dpv/risk/owl/#Damage
    + https://w3id.org/dpv/risk#Damage
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that controls the ConsequencesSomething that acts as or causes Damage
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -3481,25 +3170,25 @@

    Consequence Control

    -
    -

    Consequence for Data Subject

    +
    +

    Data Breach

    - + - + @@ -3508,31 +3197,19 @@

    Consequence for Data Subject

    - - - - - - - - - + + @@ -3541,29 +3218,40 @@

    Consequence for Data Subject

    - + - - - + + + + + + + + + - + - + + + + - + - +
    TermConsequenceForDataSubjectDataBreach Prefix risk-owl
    LabelConsequence for Data SubjectData Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ConsequenceForDataSubject
    - https://w3id.org/dpv/risk#ConsequenceForDataSubject + https://w3id.org/dpv/risk/owl/#DataBreach
    + https://w3id.org/dpv/risk#DataBreach
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionConsequence for Data SubjectSomething that acts as or causes Data Breach
    Examples Using DPV and RISK extension to represent incidents (E0069); + Using risk controls to express how tech/org measures address the risk (E0071) +
    SourceISO/IEC 27005:2018
    Date Created2022-10-222022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Georg P. KrogHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesDex Risk-consequences
    @@ -3571,25 +3259,25 @@

    Consequence for Data Subject

    -
    -

    Consequence on Data Security

    +
    +

    Data Corruption

    - + - + @@ -3598,31 +3286,18 @@

    Consequence on Data Security

    - - - - - - - - - + + @@ -3631,25 +3306,34 @@

    Consequence on Data Security

    - + - + + + + - + + + + - + - + + + + - + @@ -3660,26 +3344,25 @@

    Consequence on Data Security

    - -
    -

    Containment Control

    +
    +

    Deliberate Incident

    TermConsequenceOnDataSecurityDataCorruption Prefix risk-owl
    LabelConsequence on Data SecurityData Corruption
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ConsequenceOnDataSecurity
    - https://w3id.org/dpv/risk#ConsequenceOnDataSecurity + https://w3id.org/dpv/risk/owl/#DataCorruption
    + https://w3id.org/dpv/risk#DataCorruption
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionConsequence on Data SecuritySomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-10-222022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Georg P. KrogHarshvardhan J. Pandit
    Documented in
    - + - + @@ -3688,23 +3371,19 @@

    Containment Control

    - - @@ -3715,7 +3394,7 @@

    Containment Control

    - + @@ -3734,7 +3413,7 @@

    Containment Control

    - +
    TermContainmentControlDeliberateIncident Prefix risk-owl
    LabelContainment ControlDeliberate Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ContainmentControl
    - https://w3id.org/dpv/risk#ContainmentControl + https://w3id.org/dpv/risk/owl/#DeliberateIncident
    + https://w3id.org/dpv/risk#DeliberateIncident
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Incident + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasIncident
    DefinitionControl to contain eventIncident caused due to deliberate actions of a human
    Documented inRisk Risk-controlsRisk Incident
    @@ -3742,25 +3421,25 @@

    Containment Control

    -
    -

    Copyright Violation

    +
    +

    Denial of Service Attack (DoS)

    - + - + @@ -3769,33 +3448,18 @@

    Copyright Violation

    - - - - - - - - - + + @@ -3804,7 +3468,7 @@

    Copyright Violation

    - + @@ -3813,7 +3477,7 @@

    Copyright Violation

    - + @@ -3822,7 +3486,10 @@

    Copyright Violation

    - + + + + @@ -3834,30 +3501,28 @@

    Copyright Violation

    TermCopyrightViolationDenialServiceAttack Prefix risk-owl
    LabelCopyright ViolationDenial of Service Attack (DoS)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CopyrightViolation
    - https://w3id.org/dpv/risk#CopyrightViolation + https://w3id.org/dpv/risk/owl/#DenialServiceAttack
    + https://w3id.org/dpv/risk#DenialServiceAttack
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCopyright ViolationSomething that acts as or causes Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018,ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - - -
    -

    Corruption of Data

    +
    +

    Detection Control

    - + - + @@ -3866,30 +3531,23 @@

    Corruption of Data

    - - - - - + - @@ -3900,32 +3558,26 @@

    Corruption of Data

    - + - - - - + - + - - - - + - +
    TermCorruptionDataDetectionControl Prefix risk-owl
    LabelCorruption of DataDetection Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CorruptionData
    - https://w3id.org/dpv/risk#CorruptionData + https://w3id.org/dpv/risk/owl/#DetectionControl
    + https://w3id.org/dpv/risk#DetectionControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionCorruption of DataControl to detect event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -3933,25 +3585,25 @@

    Corruption of Data

    -
    -

    Cost of Acquisition

    +
    +

    Detriment

    - + - + @@ -3960,32 +3612,18 @@

    Cost of Acquisition

    - - - - - - - - - + + @@ -3994,28 +3632,28 @@

    Cost of Acquisition

    - + - - - - + - + - + + + + - + @@ -4027,25 +3665,25 @@

    Cost of Acquisition

    -
    -

    Cost of Backup

    +
    +

    Discrimination

    TermCostAcquisitionDetriment Prefix risk-owl
    LabelCost of AcquisitionDetriment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostAcquisition
    - https://w3id.org/dpv/risk#CostAcquisition + https://w3id.org/dpv/risk/owl/#Detriment
    + https://w3id.org/dpv/risk#Detriment
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of AcquisitionSomething that acts as or causes Detriment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    Documented in
    - + - + @@ -4054,32 +3692,18 @@

    Cost of Backup

    - - - - - - - - - + + @@ -4088,28 +3712,28 @@

    Cost of Backup

    - + - - - - + - + - + + + + - + @@ -4121,25 +3745,25 @@

    Cost of Backup

    -
    -

    Cost of Configuration

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermCostBackupDiscrimination Prefix risk-owl
    LabelCost of BackupDiscrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostBackup
    - https://w3id.org/dpv/risk#CostBackup + https://w3id.org/dpv/risk/owl/#Discrimination
    + https://w3id.org/dpv/risk#Discrimination
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of BackupSomething that acts as or causes Discrimination
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    Documented in
    - + - + @@ -4148,32 +3772,18 @@

    Cost of Configuration

    - - - - - - - - - + + @@ -4182,7 +3792,7 @@

    Cost of Configuration

    - + @@ -4200,7 +3810,10 @@

    Cost of Configuration

    - + + + + @@ -4214,26 +3827,25 @@

    Cost of Configuration

    - -
    -

    Cost of Installation

    +
    +

    Environmental Incident

    TermCostConfigurationDistributedDenialServiceAttack Prefix risk-owl
    LabelCost of ConfigurationDistributed Denial of Service Attack (DDoS)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostConfiguration
    - https://w3id.org/dpv/risk#CostConfiguration + https://w3id.org/dpv/risk/owl/#DistributedDenialServiceAttack
    + https://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of ConfigurationSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -4242,30 +3854,19 @@

    Cost of Installation

    - - - - - + - @@ -4276,32 +3877,26 @@

    Cost of Installation

    - + - - - - + - + - - - - + - +
    TermCostInstallationEnvironmentalIncident Prefix risk-owl
    LabelCost of InstallationEnvironmental Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostInstallation
    - https://w3id.org/dpv/risk#CostInstallation + https://w3id.org/dpv/risk/owl/#EnvironmentalIncident
    + https://w3id.org/dpv/risk#EnvironmentalIncident
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:Incident + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:hasIncident
    DefinitionCost of InstallationIncident caused due to environmental factors outside human controls
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -4309,25 +3904,25 @@

    Cost of Installation

    -
    -

    Cost of Judicial Penalties

    +
    +

    Environmental Risk

    - + - + @@ -4336,32 +3931,17 @@

    Cost of Judicial Penalties

    - - - - - - - - - + + @@ -4370,29 +3950,20 @@

    Cost of Judicial Penalties

    - + - - - - + - - - - + + - - - - @@ -4403,25 +3974,25 @@

    Cost of Judicial Penalties

    -
    -

    Cost of Judicial Proceedings

    +
    +

    Equipment Failure

    TermCostJudicialPenaltiesEnvironmentalRisk Prefix risk-owl
    LabelCost of Judicial PenaltiesEnvironmental Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostJudicialPenalties
    - https://w3id.org/dpv/risk#CostJudicialPenalties + https://w3id.org/dpv/risk/owl/#EnvironmentalRisk
    + https://w3id.org/dpv/risk#EnvironmentalRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of Judicial PenaltiesRisks and issues that have their origin in environment or can affect the environment at large
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -4430,32 +4001,18 @@

    Cost of Judicial Proceedings

    - - - - - - - - - + + @@ -4464,9 +4021,12 @@

    Cost of Judicial Proceedings

    - + - + + + + @@ -4482,7 +4042,10 @@

    Cost of Judicial Proceedings

    - + + + + @@ -4497,25 +4060,25 @@

    Cost of Judicial Proceedings

    -
    -

    Cost of Operation Interruption

    +
    +

    Equipment Malfunction

    TermCostJudicialProceedingsEquipmentFailure Prefix risk-owl
    LabelCost of Judicial ProceedingsEquipment Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostJudicialProceedings
    - https://w3id.org/dpv/risk#CostJudicialProceedings + https://w3id.org/dpv/risk/owl/#EquipmentFailure
    + https://w3id.org/dpv/risk#EquipmentFailure
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of Judicial ProceedingsSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -4524,32 +4087,18 @@

    Cost of Operation Interruption

    - - - - - - - - - + + @@ -4558,9 +4107,12 @@

    Cost of Operation Interruption

    - + - + + + + @@ -4576,7 +4128,10 @@

    Cost of Operation Interruption

    - + + + + @@ -4591,25 +4146,25 @@

    Cost of Operation Interruption

    -
    -

    Cost of Suspended Operations

    +
    +

    Erroneous System Use

    TermCostOperationInterruptionEquipmentMalfunction Prefix risk-owl
    LabelCost of Operation InterruptionEquipment Malfunction
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostOperationInterruption
    - https://w3id.org/dpv/risk#CostOperationInterruption + https://w3id.org/dpv/risk/owl/#EquipmentMalfunction
    + https://w3id.org/dpv/risk#EquipmentMalfunction
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of Operation InterruptionSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -4618,32 +4173,18 @@

    Cost of Suspended Operations

    - - - - - - - - - + + @@ -4652,7 +4193,7 @@

    Cost of Suspended Operations

    - + @@ -4670,7 +4211,10 @@

    Cost of Suspended Operations

    - + + + + @@ -4684,25 +4228,28 @@

    Cost of Suspended Operations

    -
    -

    Cross-Border Incident

    + + + +
    +

    Exposure to Harmful Speech

    TermCostSuspendedOperationsErroneousSystemUse Prefix risk-owl
    LabelCost of Suspended OperationsErroneous System Use
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CostSuspendedOperations
    - https://w3id.org/dpv/risk#CostSuspendedOperations + https://w3id.org/dpv/risk/owl/#ErroneousSystemUse
    + https://w3id.org/dpv/risk#ErroneousSystemUse
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:UserRisks + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCost of Suspended OperationsSomething that acts as or causes Erroneous System Use
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -4711,20 +4258,18 @@

    Cross-Border Incident

    - - - - - + @@ -4733,26 +4278,38 @@

    Cross-Border Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - +
    TermCrossBorderIncidentExposureToHarmfulSpeech Prefix risk-owl
    LabelCross-Border IncidentExposure to Harmful Speech
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CrossBorderIncident
    - https://w3id.org/dpv/risk#CrossBorderIncident + https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
    + https://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Incident + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident involving cross-border or multiple jurisdictionsSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-consequences
    @@ -4760,25 +4317,25 @@

    Cross-Border Incident

    -
    -

    Cryptojacking

    +
    +

    External Security Threat

    - + - + @@ -4787,32 +4344,17 @@

    Cryptojacking

    - - - - - - - - - + + @@ -4821,29 +4363,20 @@

    Cryptojacking

    - + - - - - + - - - - + + - - - - @@ -4854,25 +4387,25 @@

    Cryptojacking

    -
    -

    Cyber Spying

    +
    +

    Extorsion

    TermCryptojackingExternalSecurityThreat Prefix risk-owl
    LabelCryptojackingExternal Security Threat
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Cryptojacking
    - https://w3id.org/dpv/risk#Cryptojacking + https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
    + https://w3id.org/dpv/risk#ExternalSecurityThreat
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrencyConcepts associated with security threats that are likely to originate externally
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -4881,33 +4414,18 @@

    Cyber Spying

    - - - - - - - - - + + @@ -4916,7 +4434,7 @@

    Cyber Spying

    - + @@ -4925,7 +4443,7 @@

    Cyber Spying

    - + @@ -4934,7 +4452,10 @@

    Cyber Spying

    - + + + + @@ -4949,25 +4470,25 @@

    Cyber Spying

    -
    -

    Cyber Stalking

    +
    +

    Extremely High Likelihood

    TermCyberSpyingExtorsion Prefix risk-owl
    LabelCyber SpyingExtorsion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CyberSpying
    - https://w3id.org/dpv/risk#CyberSpying + https://w3id.org/dpv/risk/owl/#Extorsion
    + https://w3id.org/dpv/risk#Extorsion
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionCyber SpyingSomething that acts as or causes Extorsion
    SourceISO/IEC 27005:2018ENISA Threat Taxonomy 2016
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -4976,31 +4497,20 @@

    Cyber Stalking

    - - - - - + - @@ -5011,23 +4521,23 @@

    Cyber Stalking

    - + - + + + + - - - - + - + @@ -5036,7 +4546,7 @@

    Cyber Stalking

    - +
    TermCyberStalkingExtremelyHighLikelihood Prefix risk-owl
    LabelCyber StalkingExtremely High Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CyberStalking
    - https://w3id.org/dpv/risk#CyberStalking + https://w3id.org/dpv/risk/owl/#ExtremelyHighLikelihood
    + https://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Likelihood
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasLikelihood
    DefinitionCyber StalkingLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -5044,25 +4554,25 @@

    Cyber Stalking

    -
    -

    Damage

    +
    +

    Extremely High Risk

    - + - + @@ -5071,29 +4581,20 @@

    Damage

    - - - - - + - @@ -5104,9 +4605,12 @@

    Damage

    - + - + + + + @@ -5117,7 +4621,7 @@

    Damage

    - + @@ -5126,7 +4630,7 @@

    Damage

    - +
    TermDamageExtremelyHighRisk Prefix risk-owl
    LabelDamageExtremely High Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Damage
    - https://w3id.org/dpv/risk#Damage + https://w3id.org/dpv/risk/owl/#ExtremelyHighRisk
    + https://w3id.org/dpv/risk#ExtremelyHighRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskLevel
    Sub-class of dpv-owl:Risk + risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasRiskLevel
    DefinitionImpact that acts as or causes damagesLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -5134,25 +4638,25 @@

    Damage

    -
    -

    Damage by Third Party

    +
    +

    Extremely High Severity

    - + - + @@ -5161,30 +4665,20 @@

    Damage by Third Party

    - - - - - + - @@ -5195,23 +4689,23 @@

    Damage by Third Party

    - + - + + + + - - - - + - + @@ -5220,7 +4714,7 @@

    Damage by Third Party

    - +
    TermDamageByThirdPartyExtremelyHighSeverity Prefix risk-owl
    LabelDamage by Third PartyExtremely High Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DamageByThirdParty
    - https://w3id.org/dpv/risk#DamageByThirdParty + https://w3id.org/dpv/risk/owl/#ExtremelyHighSeverity
    + https://w3id.org/dpv/risk#ExtremelyHighSeverity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Severity
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasSeverity
    DefinitionDamage by Third PartyLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -5228,25 +4722,25 @@

    Damage by Third Party

    -
    -

    Danger to Customers

    +
    +

    Extremely Low Likelihood

    - + - + @@ -5255,31 +4749,20 @@

    Danger to Customers

    - - - - - + - @@ -5290,23 +4773,23 @@

    Danger to Customers

    - + - + + + + - - - - + - + @@ -5315,7 +4798,7 @@

    Danger to Customers

    - +
    TermDangertoCustomersExtremelyLowLikelihood Prefix risk-owl
    LabelDanger to CustomersExtremely Low Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DangertoCustomers
    - https://w3id.org/dpv/risk#DangertoCustomers + https://w3id.org/dpv/risk/owl/#ExtremelyLowLikelihood
    + https://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Likelihood
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasLikelihood
    DefinitionDanger to CustomersLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -5323,25 +4806,25 @@

    Danger to Customers

    -
    -

    Danger to Personnel

    +
    +

    Extremely Low Risk

    - + - + @@ -5350,31 +4833,20 @@

    Danger to Personnel

    - - - - - + - @@ -5385,23 +4857,23 @@

    Danger to Personnel

    - + - + + + + - - - - + - + @@ -5410,7 +4882,7 @@

    Danger to Personnel

    - +
    TermDangertoPersonnelExtremelyLowRisk Prefix risk-owl
    LabelDanger to PersonnelExtremely Low Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DangertoPersonnel
    - https://w3id.org/dpv/risk#DangertoPersonnel + https://w3id.org/dpv/risk/owl/#ExtremelyLowRisk
    + https://w3id.org/dpv/risk#ExtremelyLowRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskLevel
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasRiskLevel
    DefinitionDanger to PersonnelLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -5418,25 +4890,25 @@

    Danger to Personnel

    -
    -

    Data Breach

    +
    +

    Extremely Low Severity

    - + - + @@ -5445,30 +4917,20 @@

    Data Breach

    - - - - - + - @@ -5479,28 +4941,23 @@

    Data Breach

    - + + + + + - - - - - - - - + - + @@ -5509,32 +4966,33 @@

    Data Breach

    - +
    TermDataBreachExtremelyLowSeverity Prefix risk-owl
    LabelData BreachExtremely Low Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DataBreach
    - https://w3id.org/dpv/risk#DataBreach + https://w3id.org/dpv/risk/owl/#ExtremelyLowSeverity
    + https://w3id.org/dpv/risk#ExtremelyLowSeverity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Severity
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasSeverity
    DefinitionData BreachLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Examples Using DPV and RISK extension to represent incidents (E0069); - Using risk controls to express how tech/org measures address the risk (E0071) -
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inDex Risk-consequencesRisk Risk-levels
    -
    -

    Deliberate Incident

    + +
    +

    Fee

    - + - + @@ -5543,20 +5001,18 @@

    Deliberate Incident

    - - - - - + @@ -5565,26 +5021,35 @@

    Deliberate Incident

    - + - + + + + - + - - + + + + + + + + - +
    TermDeliberateIncidentFee Prefix risk-owl
    LabelDeliberate IncidentFee
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DeliberateIncident
    - https://w3id.org/dpv/risk#DeliberateIncident + https://w3id.org/dpv/risk/owl/#Fee
    + https://w3id.org/dpv/risk#Fee
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Incident + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident caused due to deliberate actions of a humanSomething that acts as or provides fees e.g. for using a service
    Source
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-consequences
    @@ -5592,25 +5057,25 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    Financial Impact

    - + - + @@ -5619,32 +5084,17 @@

    Denial of Service Attack (DoS)

    - - - - - - - - - + + @@ -5653,29 +5103,20 @@

    Denial of Service Attack (DoS)

    - + - - - - + - - - - + + - - - - @@ -5686,25 +5127,25 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    +
    +

    Financial Loss

    TermDenialServiceAttackFinancialImpact Prefix risk-owl
    LabelDenial of Service Attack (DoS)Financial Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DenialServiceAttack
    - https://w3id.org/dpv/risk#DenialServiceAttack + https://w3id.org/dpv/risk/owl/#FinancialImpact
    + https://w3id.org/dpv/risk#FinancialImpact
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionDenial of Service Attack (DoS)Things that cause or have the potential to impact financial resources
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -5713,25 +5154,18 @@

    Detection Control

    - - - - - + @@ -5740,26 +5174,35 @@

    Detection Control

    - + - + + + + - + - - + + + + + + + + - +
    TermDetectionControlFinancialLoss Prefix risk-owl
    LabelDetection ControlFinancial Loss
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DetectionControl
    - https://w3id.org/dpv/risk#DetectionControl + https://w3id.org/dpv/risk/owl/#FinancialLoss
    + https://w3id.org/dpv/risk#FinancialLoss
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to detect eventSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -5767,25 +5210,25 @@

    Detection Control

    -
    -

    Detriment

    +
    +

    Fraud

    - + - + @@ -5794,31 +5237,18 @@

    Detriment

    - - - - - - - - - + + @@ -5827,25 +5257,31 @@

    Detriment

    - + - + + + + - + - + + + + - + @@ -5857,25 +5293,25 @@

    Detriment

    -
    -

    Detriment to Recovery

    +
    +

    Halt Source

    TermDetrimentFraud Prefix risk-owl
    LabelDetrimentFraud
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Detriment
    - https://w3id.org/dpv/risk#Detriment + https://w3id.org/dpv/risk/owl/#Fraud
    + https://w3id.org/dpv/risk#Fraud
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionImpact that acts as or causes detrimentsSomething that acts as or causes Fraud
    SourceISO/IEC 27005:2018
    Date Created2022-03-232022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
    Documented in
    - + - + @@ -5884,30 +5320,24 @@

    Detriment to Recovery

    - - - - - + - @@ -5918,23 +5348,20 @@

    Detriment to Recovery

    - + - - - - + - + @@ -5943,7 +5370,7 @@

    Detriment to Recovery

    - +
    TermDetrimentToRecoveryHaltSource Prefix risk-owl
    LabelDetriment to RecoveryHalt Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DetrimentToRecovery
    - https://w3id.org/dpv/risk#DetrimentToRecovery + https://w3id.org/dpv/risk/owl/#HaltSource
    + https://w3id.org/dpv/risk#HaltSource
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:SourceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionDetriment to RecoveryControl that halts the risk source or prevents it from materialising
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -5951,25 +5378,25 @@

    Detriment to Recovery

    -
    -

    Discrimination

    +
    +

    Harm

    - + - + @@ -5978,33 +5405,17 @@

    Discrimination

    - - - - - - - - - + + @@ -6013,9 +5424,12 @@

    Discrimination

    - + - + + + + @@ -6026,12 +5440,15 @@

    Discrimination

    - + - + + + + - + @@ -6043,25 +5460,35 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    + + + + + + + + + + +
    +

    High Likelihood

    TermDiscriminationHarm Prefix risk-owl
    LabelDiscriminationHarm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Discrimination
    - https://w3id.org/dpv/risk#Discrimination + https://w3id.org/dpv/risk/owl/#Harm
    + https://w3id.org/dpv/risk#Harm
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IndividualRisk
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionDiscriminationSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2022-08-192022-08-13
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    Documented in
    - + - + @@ -6070,30 +5497,28 @@

    Distributed Denial of Service Attack (DDoS)

    - + + + + - - - - + - @@ -6104,23 +5529,23 @@

    Distributed Denial of Service Attack (DDoS)

    - + - + + + + - - - - + - + @@ -6129,7 +5554,7 @@

    Distributed Denial of Service Attack (DDoS)

    - +
    TermDistributedDenialServiceAttackHighLikelihood Prefix risk-owl
    LabelDistributed Denial of Service Attack (DDoS)High Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DistributedDenialServiceAttack
    - https://w3id.org/dpv/risk#DistributedDenialServiceAttack + https://w3id.org/dpv/risk/owl/#HighLikelihood
    + https://w3id.org/dpv/risk#HighLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Likelihood
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasLikelihood
    DefinitionDistributed Denial of Service Attack (DDoS)Level where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -6137,25 +5562,25 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Eavesdropping

    +
    +

    High Risk

    - + - + @@ -6164,31 +5589,28 @@

    Eavesdropping

    - + + + + - - - - + - @@ -6199,23 +5621,23 @@

    Eavesdropping

    - + - + + + + - - - - + - + @@ -6224,7 +5646,7 @@

    Eavesdropping

    - +
    TermEavesdroppingHighRisk Prefix risk-owl
    LabelEavesdroppingHigh Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Eavesdropping
    - https://w3id.org/dpv/risk#Eavesdropping + https://w3id.org/dpv/risk/owl/#HighRisk
    + https://w3id.org/dpv/risk#HighRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskLevel
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasRiskLevel
    DefinitionEavesdroppingLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -6232,25 +5654,25 @@

    Eavesdropping

    -
    -

    Economic Disadvantage

    +
    +

    High Severity

    - + - + @@ -6259,29 +5681,28 @@

    Economic Disadvantage

    - + + + + - - - - + - @@ -6292,9 +5713,12 @@

    Economic Disadvantage

    - + - + + + + @@ -6305,41 +5729,42 @@

    Economic Disadvantage

    - + - + - +
    TermEconomicDisadvantageHighSeverity Prefix risk-owl
    LabelEconomic DisadvantageHigh Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EconomicDisadvantage
    - https://w3id.org/dpv/risk#EconomicDisadvantage + https://w3id.org/dpv/risk/owl/#HighSeverity
    + https://w3id.org/dpv/risk#HighSeverity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Severity
    Sub-class of dpv-owl:Risk + risk-owl:3SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasSeverity
    DefinitionEconomic DisadvantageLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-192022-08-18
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-levels
    -
    -

    Environmental Incident

    + +
    +

    Human Errors

    - + - + @@ -6348,20 +5773,18 @@

    Environmental Incident

    - - - - - + @@ -6370,26 +5793,35 @@

    Environmental Incident

    - + - + + + + - + - - + + + + + + + + - +
    TermEnvironmentalIncidentHumanErrors Prefix risk-owl
    LabelEnvironmental IncidentHuman Errors
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EnvironmentalIncident
    - https://w3id.org/dpv/risk#EnvironmentalIncident + https://w3id.org/dpv/risk/owl/#HumanErrors
    + https://w3id.org/dpv/risk#HumanErrors
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Incident + risk-owl:UserRisks + → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident caused due to environmental factors outside human controlsSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-consequences
    @@ -6397,25 +5829,25 @@

    Environmental Incident

    -
    -

    Environmental Safety Endangerment

    +
    +

    Identification Control

    - + - + @@ -6424,31 +5856,23 @@

    Environmental Safety Endangerment

    - + - - + - - - - @@ -6459,32 +5883,26 @@

    Environmental Safety Endangerment

    - + - - - - + - + - - - - + - +
    TermEnvironmentalSafetyEndangermentIdentificationControl Prefix risk-owl
    LabelEnvironmental Safety EndangermentIdentification Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EnvironmentalSafetyEndangerment
    - https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment + https://w3id.org/dpv/risk/owl/#IdentificationControl
    + https://w3id.org/dpv/risk#IdentificationControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, + in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:hasControl
    DefinitionEnvironmental Safety EndangermentControl to identify characteristics of event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -6492,25 +5910,25 @@

    Environmental Safety Endangerment

    -
    -

    Equipment Failure

    +
    +

    Identity Fraud

    - + - + @@ -6519,126 +5937,18 @@

    Equipment Failure

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermEquipmentFailureIdentityFraud Prefix risk-owl
    LabelEquipment FailureIdentity Fraud
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EquipmentFailure
    - https://w3id.org/dpv/risk#EquipmentFailure + https://w3id.org/dpv/risk/owl/#IdentityFraud
    + https://w3id.org/dpv/risk#IdentityFraud
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionEquipment Failure
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Equipment Malfunction

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -6647,7 +5957,7 @@

    Equipment Malfunction

    - + @@ -6656,7 +5966,7 @@

    Equipment Malfunction

    - + @@ -6665,101 +5975,10 @@

    Equipment Malfunction

    - - - - - - - - - - -
    TermEquipmentMalfunctionPrefixrisk-owl
    LabelEquipment Malfunction
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EquipmentMalfunction
    - https://w3id.org/dpv/risk#EquipmentMalfunction -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionEquipment MalfunctionSomething that acts as or causes Identity Fraud
    SourceISO/IEC 27005:2018ENISA Threat Taxonomy 2016
    Date Created 2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Erroneous System Use

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + - - - - - - - - @@ -6774,27 +5993,25 @@

    Erroneous System Use

    - - -
    -

    Extorsion

    +
    +

    Identity Theft

    TermErroneousSystemUsePrefixrisk-owl
    LabelErroneous System Use
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ErroneousSystemUse
    - https://w3id.org/dpv/risk#ErroneousSystemUse -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionErroneous System Use
    SourceISO/IEC 27005:2018Date Modified2024-08-16
    Date Created2022-08-17
    Contributors Harshvardhan J. Pandit
    - + - + @@ -6803,33 +6020,18 @@

    Extorsion

    - - - - - - - - - + + @@ -6838,7 +6040,7 @@

    Extorsion

    - + @@ -6856,7 +6058,10 @@

    Extorsion

    - + + + + @@ -6871,25 +6076,25 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Illegal Data Processing

    TermExtorsionIdentityTheft Prefix risk-owl
    LabelExtorsionIdentity Theft
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Extorsion
    - https://w3id.org/dpv/risk#Extorsion + https://w3id.org/dpv/risk/owl/#IdentityTheft
    + https://w3id.org/dpv/risk#IdentityTheft
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionExtorsionSomething that acts as or causes Identity Theft
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -6898,4193 +6103,18 @@

    Extremely High Likelihood

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighLikelihoodIllegalDataProcessing Prefix risk-owl
    LabelExtremely High LikelihoodIllegal Data Processing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyHighLikelihood
    - https://w3id.org/dpv/risk#ExtremelyHighLikelihood + https://w3id.org/dpv/risk/owl/#IllegalDataProcessing
    + https://w3id.org/dpv/risk#IllegalDataProcessing
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood -
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Extremely High Risk

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighRiskPrefixrisk-owl
    LabelExtremely High Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyHighRisk
    - https://w3id.org/dpv/risk#ExtremelyHighRisk -
    Type rdfs:Class - , owl:Class - , dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel -
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Extremely High Severity

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighSeverityPrefixrisk-owl
    LabelExtremely High Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyHighSeverity
    - https://w3id.org/dpv/risk#ExtremelyHighSeverity -
    Type rdfs:Class - , owl:Class - , dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity -
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Extremely Low Likelihood

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyLowLikelihoodPrefixrisk-owl
    LabelExtremely Low Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyLowLikelihood
    - https://w3id.org/dpv/risk#ExtremelyLowLikelihood -
    Type rdfs:Class - , owl:Class - , dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood -
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Extremely Low Risk

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyLowRiskPrefixrisk-owl
    LabelExtremely Low Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyLowRisk
    - https://w3id.org/dpv/risk#ExtremelyLowRisk -
    Type rdfs:Class - , owl:Class - , dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel -
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Extremely Low Severity

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyLowSeverityPrefixrisk-owl
    LabelExtremely Low Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyLowSeverity
    - https://w3id.org/dpv/risk#ExtremelyLowSeverity -
    Type rdfs:Class - , owl:Class - , dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity -
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Fee

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFeePrefixrisk-owl
    LabelFee
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Fee
    - https://w3id.org/dpv/risk#Fee -
    Type rdfs:Class - , owl:Class - , dpv-owl:Impact -
    Sub-class of risk-owl:Compensation - → risk-owl:Benefit - → dpv-owl:Impact - → dpv-owl:Consequence -
    in Domain of dpv-owl:hasImpactOn -
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact -
    DefinitionFee provided as compensation (as an impact)
    Source
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Financial Equipment Costs

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFinancialEquipmentCostsPrefixrisk-owl
    LabelFinancial Equipment Costs
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialEquipmentCosts
    - https://w3id.org/dpv/risk#FinancialEquipmentCosts -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionFinancial Equipment Costs
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Financial Investigation Costs

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFinancialInvestigationCostsPrefixrisk-owl
    LabelFinancial Investigation Costs
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialInvestigationCosts
    - https://w3id.org/dpv/risk#FinancialInvestigationCosts -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionFinancial Investigation Costs
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Financial Loss

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFinancialLossPrefixrisk-owl
    LabelFinancial Loss
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialLoss
    - https://w3id.org/dpv/risk#FinancialLoss -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionFinancial Loss
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Financial Personnel Costs

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFinancialPersonnelCostsPrefixrisk-owl
    LabelFinancial Personnel Costs
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialPersonnelCosts
    - https://w3id.org/dpv/risk#FinancialPersonnelCosts -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionFinancial Personnel Costs
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Financial Repair Costs

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFinancialRepairCostsPrefixrisk-owl
    LabelFinancial Repair Costs
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialRepairCosts
    - https://w3id.org/dpv/risk#FinancialRepairCosts -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionFinancial Repair Costs
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Fraud

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFraudPrefixrisk-owl
    LabelFraud
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Fraud
    - https://w3id.org/dpv/risk#Fraud -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionFraud
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Government Crisis

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermGovernmentCrisisPrefixrisk-owl
    LabelGovernment Crisis
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#GovernmentCrisis
    - https://w3id.org/dpv/risk#GovernmentCrisis -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionGovernment Crisis
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Halt Source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHaltSourcePrefixrisk-owl
    LabelHalt Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HaltSource
    - https://w3id.org/dpv/risk#HaltSource -
    Type rdfs:Class - , owl:Class - , risk-owl:RiskControl -
    Sub-class of risk-owl:SourceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialising
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    -
    - - - -
    -

    Harm

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHarmPrefixrisk-owl
    LabelHarm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Harm
    - https://w3id.org/dpv/risk#Harm -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionImpact that acts as or causes harms
    Date Created2022-08-13
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Harmful Speech

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHarmfulSpeechPrefixrisk-owl
    LabelHarmful Speech
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HarmfulSpeech
    - https://w3id.org/dpv/risk#HarmfulSpeech -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionHarmful Speech
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - - - - - - - - - - - -
    -

    Health and life impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHealthLifeImpactPrefixrisk-owl
    LabelHealth and life impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HealthLifeImpact
    - https://w3id.org/dpv/risk#HealthLifeImpact -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionHealth and life impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    High Likelihood

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHighLikelihoodPrefixrisk-owl
    LabelHigh Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HighLikelihood
    - https://w3id.org/dpv/risk#HighLikelihood -
    Type rdfs:Class - , owl:Class - , dpv-owl:Likelihood -
    Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood -
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    High Risk

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHighRiskPrefixrisk-owl
    LabelHigh Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HighRisk
    - https://w3id.org/dpv/risk#HighRisk -
    Type rdfs:Class - , owl:Class - , dpv-owl:RiskLevel -
    Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel -
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    High Severity

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHighSeverityPrefixrisk-owl
    LabelHigh Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HighSeverity
    - https://w3id.org/dpv/risk#HighSeverity -
    Type rdfs:Class - , owl:Class - , dpv-owl:Severity -
    Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity -
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    -
    - - - -
    -

    Human Errors

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermHumanErrorsPrefixrisk-owl
    LabelHuman Errors
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HumanErrors
    - https://w3id.org/dpv/risk#HumanErrors -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionHuman Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Identification Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIdentificationControlPrefixrisk-owl
    LabelIdentification Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentificationControl
    - https://w3id.org/dpv/risk#IdentificationControl -
    Type rdfs:Class - , owl:Class - , risk-owl:RiskControl -
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to identify characteristics of event
    Date Created2024-05-19
    Documented inRisk Risk-controls
    -
    - - - -
    -

    Identity Dispute

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIdentityDisputePrefixrisk-owl
    LabelIdentity Dispute
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentityDispute
    - https://w3id.org/dpv/risk#IdentityDispute -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionIdentity Dispute
    Date Created2022-08-24
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Identity Fraud

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIdentityFraudPrefixrisk-owl
    LabelIdentity Fraud
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentityFraud
    - https://w3id.org/dpv/risk#IdentityFraud -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionIdentity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Identity Theft

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIdentityTheftPrefixrisk-owl
    LabelIdentity Theft
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentityTheft
    - https://w3id.org/dpv/risk#IdentityTheft -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionIdentity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Illegal Processing of Data

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIllegalProcessingDataPrefixrisk-owl
    LabelIllegal Processing of Data
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IllegalProcessingData
    - https://w3id.org/dpv/risk#IllegalProcessingData -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionIllegal Processing of Data
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Impact Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermImpactControlPrefixrisk-owl
    LabelImpact Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ImpactControl
    - https://w3id.org/dpv/risk#ImpactControl -
    Type rdfs:Class - , owl:Class - , risk-owl:RiskControl -
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that controls Impacts
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    -
    - - - -
    -

    Impact on Data Subject

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermImpactOnDataSubjectPrefixrisk-owl
    LabelImpact on Data Subject
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ImpactOnDataSubject
    - https://w3id.org/dpv/risk#ImpactOnDataSubject -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionImpact on Data Subject
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Impact to Rights

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermImpactToRightsPrefixrisk-owl
    LabelImpact to Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ImpactToRights
    - https://w3id.org/dpv/risk#ImpactToRights -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionImpact to Rights
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - -
    -

    Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentPrefixrisk-owl
    LabelIncident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Incident
    - https://w3id.org/dpv/risk#Incident -
    Type rdfs:Class - , owl:Class -
    in Range of risk-owl:hasIncident -
    DefinitionAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples Using DPV and RISK extension to represent incidents (E0069); - Indicating personal data involved in an incident (E0070) -
    Date Created2024-05-19
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    Documented inDex Core, Dex Incident
    -
    - - - - -
    -

    Incident Assessment Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentAssessmentReportPrefixrisk-owl
    LabelIncident Assessment Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentAssessmentReport
    - https://w3id.org/dpv/risk#IncidentAssessmentReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the assessment of an incident in terms of its effects or impacts
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - - -
    -

    Incident Concluded

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentConcludedPrefixrisk-owl
    LabelIncident Concluded
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentConcluded
    - https://w3id.org/dpv/risk#IncidentConcluded -
    Type rdfs:Class - , owl:Class - , risk-owl:IncidentStatus -
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context -
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-status
    -
    - - -
    -

    Incident Concluding Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentConcludingReportPrefixrisk-owl
    LabelIncident Concluding Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentConcludingReport
    - https://w3id.org/dpv/risk#IncidentConcludingReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - -
    -

    Incident Detection Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentDetectionReportPrefixrisk-owl
    LabelIncident Detection Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentDetectionReport
    - https://w3id.org/dpv/risk#IncidentDetectionReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the detection of a Incident
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - - -
    -

    Incident Halted

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentHaltedPrefixrisk-owl
    LabelIncident Halted
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentHalted
    - https://w3id.org/dpv/risk#IncidentHalted -
    Type rdfs:Class - , owl:Class - , risk-owl:IncidentStatus -
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context -
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurring
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-status
    -
    - - -
    -

    Incident Handling Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentHandlingReportPrefixrisk-owl
    LabelIncident Handling Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentHandlingReport
    - https://w3id.org/dpv/risk#IncidentHandlingReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - -
    -

    Incident Identifier

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentIdentifierPrefixrisk-owl
    LabelIncident Identifier
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentIdentifier
    - https://w3id.org/dpv/risk#IncidentIdentifier -
    Type rdfs:Class - , owl:Class -
    DefinitionIdentifier associated with an incident
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - -
    -

    Incident Impact Assessment

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentImpactAssessmentPrefixrisk-owl
    LabelIncident Impact Assessment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentImpactAssessment
    - https://w3id.org/dpv/risk#IncidentImpactAssessment -
    Type rdfs:Class - , owl:Class -
    Sub-class of dpv-owl:ImpactAssessment - → dpv-owl:RiskAssessment - → dpv-owl:Assessment - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasAssessment, - dpv-owl:hasImpactAssessment, - dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRiskAssessment, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incident
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident
    -
    - - - -
    -

    Incident Mitigated

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentMitigatedPrefixrisk-owl
    LabelIncident Mitigated
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentMitigated
    - https://w3id.org/dpv/risk#IncidentMitigated -
    Type rdfs:Class - , owl:Class - , risk-owl:IncidentStatus -
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context -
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-status
    -
    - - -
    -

    Incident Mitigation Measure

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentMitigationMeasurePrefixrisk-owl
    LabelIncident Mitigation Measure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentMitigationMeasure
    - https://w3id.org/dpv/risk#IncidentMitigationMeasure -
    Type rdfs:Class - , owl:Class -
    Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - - -
    -

    Incident Near Miss

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentNearMissPrefixrisk-owl
    LabelIncident Near Miss
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentNearMiss
    - https://w3id.org/dpv/risk#IncidentNearMiss -
    Type rdfs:Class - , owl:Class - , risk-owl:IncidentStatus -
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context -
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-status
    -
    - - -
    -

    Incident Notice

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentNoticePrefixrisk-owl
    LabelIncident Notice
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentNotice
    - https://w3id.org/dpv/risk#IncidentNotice -
    Type rdfs:Class - , owl:Class -
    Sub-class of dpv-owl:Notice - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasNotice, - dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an Incident
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - - -
    -

    Incident Ongoing

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentOngoingPrefixrisk-owl
    LabelIncident Ongoing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentOngoing
    - https://w3id.org/dpv/risk#IncidentOngoing -
    Type rdfs:Class - , owl:Class - , risk-owl:IncidentStatus -
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context -
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident is ongoing i.e. still active
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-status
    -
    - - -
    -

    Incident Ongoing Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentOngoingReportPrefixrisk-owl
    LabelIncident Ongoing Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentOngoingReport
    - https://w3id.org/dpv/risk#IncidentOngoingReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - -
    -

    Incident Preliminary Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentPreliminaryReportPrefixrisk-owl
    LabelIncident Preliminary Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentPreliminaryReport
    - https://w3id.org/dpv/risk#IncidentPreliminaryReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - -
    -

    Incident Register

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentRegisterPrefixrisk-owl
    LabelIncident Register
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentRegister
    - https://w3id.org/dpv/risk#IncidentRegister -
    Type rdfs:Class - , owl:Class -
    Sub-class of dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activities
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident
    -
    - - -
    -

    Incident Report

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermIncidentReportPrefixrisk-owl
    LabelIncident Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentReport
    - https://w3id.org/dpv/risk#IncidentReport -
    Type rdfs:Class - , owl:Class -
    Sub-class of dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionDocumented information about an incident, its handling, assessments,and notifications
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - -
    -

    Incident Status

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + @@ -11093,33 +6123,38 @@

    Incident Status

    - + + + + + - - - - - + + + + - + - + + + + - +
    TermIncidentStatusPrefixrisk-owl
    LabelIncident Status
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentStatus
    - https://w3id.org/dpv/risk#IncidentStatus -
    Type rdfs:Class - , owl:Class -
    Sub-class of dpv-owl:Status - → dpv-owl:Context + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionStatus associated with an incidentSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    Examples Using DPV and RISK extension to represent incidents (E0069) -
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inDex Incident-statusRisk Risk-consequences
    @@ -11127,25 +6162,25 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Impact Control

    - + - + @@ -11154,22 +6189,23 @@

    Incident Status Unknown

    - - @@ -11180,7 +6216,7 @@

    Incident Status Unknown

    - + @@ -11193,7 +6229,7 @@

    Incident Status Unknown

    - + @@ -11202,33 +6238,32 @@

    Incident Status Unknown

    - +
    TermIncidentStatusUnknownImpactControl Prefix risk-owl
    LabelIncident Status UnknownImpact Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentStatusUnknown
    - https://w3id.org/dpv/risk#IncidentStatusUnknown + https://w3id.org/dpv/risk/owl/#ImpactControl
    + https://w3id.org/dpv/risk#ImpactControl
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , risk-owl:RiskControl
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionThe status of a incident is unknownRisk Mitigation Measure that controls Impacts
    Date Created2024-02-142024-05-19
    Documented inRisk Incident-statusRisk Risk-controls
    - -
    -

    Incident Suspected

    +
    +

    Incident

    - + - + @@ -11237,22 +6272,18 @@

    Incident Suspected

    - - @@ -11263,10 +6294,18 @@

    Incident Suspected

    - + + + + + - + + + @@ -11278,39 +6317,44 @@

    Incident Suspected

    - + + + + - + - +
    TermIncidentSuspectedIncident Prefix risk-owl
    LabelIncident SuspectedIncident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentSuspected
    - https://w3id.org/dpv/risk#IncidentSuspected + https://w3id.org/dpv/risk/owl/#Incident
    + https://w3id.org/dpv/risk#Incident
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + risk-owl:hasIncident
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples Using DPV and RISK extension to represent incidents (E0069); + Indicating personal data involved in an incident (E0070) +
    Date Created 2024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    Documented inRisk Incident-statusDex Core, Dex Incident
    + + -
    -

    Incident Suspected Report

    +
    +

    Incident Assessment Report

    - + - + @@ -11346,7 +6390,7 @@

    Incident Suspected Report

    - + @@ -11373,25 +6417,25 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Incident Concluded

    TermIncidentSuspectedReportIncidentAssessmentReport Prefix risk-owl
    LabelIncident Suspected ReportIncident Assessment Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentSuspectedReport
    - https://w3id.org/dpv/risk#IncidentSuspectedReport + https://w3id.org/dpv/risk/owl/#IncidentAssessmentReport
    + https://w3id.org/dpv/risk#IncidentAssessmentReport
    DefinitionA report describing the suspicion of an incident in the past or occuringA report describing the assessment of an incident in terms of its effects or impacts
    - + - + @@ -11426,7 +6470,7 @@

    Incident Terminated

    - + @@ -11455,26 +6499,25 @@

    Incident Terminated

    - -
    -

    Increase Internal Cost

    +
    +

    Incident Concluding Report

    TermIncidentTerminatedIncidentConcluded Prefix risk-owl
    LabelIncident TerminatedIncident Concluded
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentTerminated
    - https://w3id.org/dpv/risk#IncidentTerminated + https://w3id.org/dpv/risk/owl/#IncidentConcluded
    + https://w3id.org/dpv/risk#IncidentConcluded
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    - + - + @@ -11483,30 +6526,23 @@

    Increase Internal Cost

    - - - - - + - @@ -11517,58 +6553,51 @@

    Increase Internal Cost

    - + - - - - + - + - - - - + - +
    TermIncreaseInternalCostIncidentConcludingReport Prefix risk-owl
    LabelIncrease Internal CostIncident Concluding Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncreaseInternalCost
    - https://w3id.org/dpv/risk#IncreaseInternalCost + https://w3id.org/dpv/risk/owl/#IncidentConcludingReport
    + https://w3id.org/dpv/risk#IncidentConcludingReport
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionIncrease Internal CostA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    - -
    -

    Industrial Crisis

    +
    +

    Incident Detection Report

    - + - + @@ -11577,30 +6606,23 @@

    Industrial Crisis

    - - - - - + - @@ -11611,32 +6633,26 @@

    Industrial Crisis

    - + - - - - + - + - - - - + - +
    TermIndustrialCrisisIncidentDetectionReport Prefix risk-owl
    LabelIndustrial CrisisIncident Detection Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IndustrialCrisis
    - https://w3id.org/dpv/risk#IndustrialCrisis + https://w3id.org/dpv/risk/owl/#IncidentDetectionReport
    + https://w3id.org/dpv/risk#IncidentDetectionReport
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionIndustrial CrisisA report describing the detection of a Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -11644,25 +6660,25 @@

    Industrial Crisis

    -
    -

    Injury

    +
    +

    Incident Halted

    - + - + @@ -11671,31 +6687,22 @@

    Injury

    - - - - - + - @@ -11706,23 +6713,20 @@

    Injury

    - + - - - - + - + @@ -11731,32 +6735,32 @@

    Injury

    - +
    TermInjuryIncidentHalted Prefix risk-owl
    LabelInjuryIncident Halted
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Injury
    - https://w3id.org/dpv/risk#Injury + https://w3id.org/dpv/risk/owl/#IncidentHalted
    + https://w3id.org/dpv/risk#IncidentHalted
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionInjuryThe incident has halted or paused with a high likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesRisk Incident-status
    -
    -

    Integrity Incident

    +
    +

    Incident Handling Report

    - + - + @@ -11770,13 +6774,18 @@

    Integrity Incident

    - - @@ -11787,7 +6796,7 @@

    Integrity Incident

    - + @@ -11813,26 +6822,25 @@

    Integrity Incident

    - -
    -

    Interception of Communications

    +
    +

    Incident Identifier

    TermIntegrityIncidentIncidentHandlingReport Prefix risk-owl
    LabelIntegrity IncidentIncident Handling Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntegrityIncident
    - https://w3id.org/dpv/risk#IntegrityIncident + https://w3id.org/dpv/risk/owl/#IncidentHandlingReport
    + https://w3id.org/dpv/risk#IncidentHandlingReport
    Sub-class of risk-owl:Incident + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of risk-owl:hasIncident + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionIncident where the integrity of information or system has been affectedA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    - + - + @@ -11841,32 +6849,13 @@

    Interception of Communications

    - - - - - - - - - - - + + + @@ -11875,58 +6864,51 @@

    Interception of Communications

    - + - - - - + - + - - - - + - +
    TermInterceptionCommunicationsIncidentIdentifier Prefix risk-owl
    LabelInterception of CommunicationsIncident Identifier
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#InterceptionCommunications
    - https://w3id.org/dpv/risk#InterceptionCommunications + https://w3id.org/dpv/risk/owl/#IncidentIdentifier
    + https://w3id.org/dpv/risk#IncidentIdentifier
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionInterception of CommunicationsIdentifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    - -
    -

    Internal Operation Disruption

    +
    +

    Incident Impact Assessment

    - + - + @@ -11935,30 +6917,26 @@

    Internal Operation Disruption

    - - - - - + - @@ -11969,23 +6947,20 @@

    Internal Operation Disruption

    - + - - - - + - + @@ -11994,7 +6969,7 @@

    Internal Operation Disruption

    - +
    TermInternalOperationDisruptionIncidentImpactAssessment Prefix risk-owl
    LabelInternal Operation DisruptionIncident Impact Assessment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#InternalOperationDisruption
    - https://w3id.org/dpv/risk#InternalOperationDisruption + https://w3id.org/dpv/risk/owl/#IncidentImpactAssessment
    + https://w3id.org/dpv/risk#IncidentImpactAssessment
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:ImpactAssessment + → dpv-owl:RiskAssessment + → dpv-owl:Assessment + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasAssessment, + dpv-owl:hasImpactAssessment, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRiskAssessment, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionInternal Operation DisruptionAn impact assessment associated with a incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Incident
    @@ -12002,29 +6977,25 @@

    Internal Operation Disruption

    - - - - -
    -

    Known Vulnerability Exploited

    +
    +

    Incident Mitigated

    - + - + @@ -12033,30 +7004,22 @@

    Known Vulnerability Exploited

    - - - - - + - @@ -12067,23 +7030,20 @@

    Known Vulnerability Exploited

    - + - - - - + - + @@ -12092,33 +7052,32 @@

    Known Vulnerability Exploited

    - +
    TermKnownVulnerabilityExploitedIncidentMitigated Prefix risk-owl
    LabelKnown Vulnerability ExploitedIncident Mitigated
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#KnownVulnerabilityExploited
    - https://w3id.org/dpv/risk#KnownVulnerabilityExploited + https://w3id.org/dpv/risk/owl/#IncidentMitigated
    + https://w3id.org/dpv/risk#IncidentMitigated
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionKnown Vulnerability ExploitedThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesRisk Incident-status
    - -
    -

    Law Enforcement Adverse Effects

    +
    +

    Incident Mitigation Measure

    - + - + @@ -12127,30 +7086,20 @@

    Law Enforcement Adverse Effects

    - - - - - + - @@ -12161,32 +7110,26 @@

    Law Enforcement Adverse Effects

    - + - - - - + - + - - - - + - +
    TermLawEnforcementAdverseEffectsIncidentMitigationMeasure Prefix risk-owl
    LabelLaw Enforcement Adverse EffectsIncident Mitigation Measure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LawEnforcementAdverseEffects
    - https://w3id.org/dpv/risk#LawEnforcementAdverseEffects + https://w3id.org/dpv/risk/owl/#IncidentMitigationMeasure
    + https://w3id.org/dpv/risk#IncidentMitigationMeasure
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure
    DefinitionLaw Enforcement Adverse EffectsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -12194,25 +7137,25 @@

    Law Enforcement Adverse Effects

    -
    -

    Limitation of Rights

    +
    +

    Incident Near Miss

    - + - + @@ -12221,31 +7164,22 @@

    Limitation of Rights

    - - - - - + - @@ -12256,7 +7190,7 @@

    Limitation of Rights

    - + @@ -12269,42 +7203,41 @@

    Limitation of Rights

    - + - + - +
    TermLimitationOfRightsIncidentNearMiss Prefix risk-owl
    LabelLimitation of RightsIncident Near Miss
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LimitationOfRights
    - https://w3id.org/dpv/risk#LimitationOfRights + https://w3id.org/dpv/risk/owl/#IncidentNearMiss
    + https://w3id.org/dpv/risk#IncidentNearMiss
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionLimitation of RightsThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2022-08-182024-02-14
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident-status
    - -
    -

    Loss of Assets

    +
    +

    Incident Notice

    - + - + @@ -12313,31 +7246,22 @@

    Loss of Assets

    - - - - - + - @@ -12348,32 +7272,26 @@

    Loss of Assets

    - + - - - - + - + - - - - + - +
    TermLossAssetsIncidentNotice Prefix risk-owl
    LabelLoss of AssetsIncident Notice
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossAssets
    - https://w3id.org/dpv/risk#LossAssets + https://w3id.org/dpv/risk/owl/#IncidentNotice
    + https://w3id.org/dpv/risk#IncidentNotice
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:MaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + dpv-owl:Notice + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasNotice, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionLoss of AssetsNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -12381,25 +7299,25 @@

    Loss of Assets

    -
    -

    Loss of Competitive Advantage

    +
    +

    Incident Ongoing

    - + - + @@ -12408,31 +7326,22 @@

    Loss of Competitive Advantage

    - - - - - + - @@ -12443,23 +7352,20 @@

    Loss of Competitive Advantage

    - + - - - - + - + @@ -12468,33 +7374,32 @@

    Loss of Competitive Advantage

    - +
    TermLossCompetitiveAdvantageIncidentOngoing Prefix risk-owl
    LabelLoss of Competitive AdvantageIncident Ongoing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossCompetitiveAdvantage
    - https://w3id.org/dpv/risk#LossCompetitiveAdvantage + https://w3id.org/dpv/risk/owl/#IncidentOngoing
    + https://w3id.org/dpv/risk#IncidentOngoing
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionLoss of Competitive AdvantageThe incident is ongoing i.e. still active
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesRisk Incident-status
    - -
    -

    Loss of Control over Data

    +
    +

    Incident Ongoing Report

    - + - + @@ -12503,31 +7408,23 @@

    Loss of Control over Data

    - - - - - + - @@ -12538,7 +7435,7 @@

    Loss of Control over Data

    - + @@ -12551,42 +7448,38 @@

    Loss of Control over Data

    - + - - - - + - +
    TermLossControlOverDataIncidentOngoingReport Prefix risk-owl
    LabelLoss of Control over DataIncident Ongoing Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossControlOverData
    - https://w3id.org/dpv/risk#LossControlOverData + https://w3id.org/dpv/risk/owl/#IncidentOngoingReport
    + https://w3id.org/dpv/risk#IncidentOngoingReport
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Control over DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    - -
    -

    Loss of Credibility

    +
    +

    Incident Preliminary Report

    - + - + @@ -12595,30 +7488,23 @@

    Loss of Credibility

    - - - - - + - @@ -12629,58 +7515,51 @@

    Loss of Credibility

    - + - - - - + - + - - - - + - +
    TermLossCredibilityIncidentPreliminaryReport Prefix risk-owl
    LabelLoss of CredibilityIncident Preliminary Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossCredibility
    - https://w3id.org/dpv/risk#LossCredibility + https://w3id.org/dpv/risk/owl/#IncidentPreliminaryReport
    + https://w3id.org/dpv/risk#IncidentPreliminaryReport
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CredibilityA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    - -
    -

    Loss of Customer Confidence

    +
    +

    Incident Register

    - + - + @@ -12689,30 +7568,22 @@

    Loss of Customer Confidence

    - - - - - + - @@ -12723,23 +7594,20 @@

    Loss of Customer Confidence

    - + - - - - + - + @@ -12748,33 +7616,32 @@

    Loss of Customer Confidence

    - +
    TermLossCustomerConfidenceIncidentRegister Prefix risk-owl
    LabelLoss of Customer ConfidenceIncident Register
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossCustomerConfidence
    - https://w3id.org/dpv/risk#LossCustomerConfidence + https://w3id.org/dpv/risk/owl/#IncidentRegister
    + https://w3id.org/dpv/risk#IncidentRegister
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Customer ConfidenceA register recording incidentes, their reports, notifications, and other related activities
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Incident
    - -
    -

    Loss of Customers

    +
    +

    Incident Report

    - + - + @@ -12783,31 +7650,22 @@

    Loss of Customers

    - - - - - + - @@ -12818,58 +7676,51 @@

    Loss of Customers

    - + - - - - + - + - - - - + - +
    TermLossCustomersIncidentReport Prefix risk-owl
    LabelLoss of CustomersIncident Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossCustomers
    - https://w3id.org/dpv/risk#LossCustomers + https://w3id.org/dpv/risk/owl/#IncidentReport
    + https://w3id.org/dpv/risk#IncidentReport
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CustomersDocumented information about an incident, its handling, assessments,and notifications
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    - -
    -

    Loss of Data

    +
    +

    Incident Status

    - + - + @@ -12878,31 +7729,20 @@

    Loss of Data

    - - - - - + - @@ -12913,23 +7753,24 @@

    Loss of Data

    - + + + + - - - - + - + @@ -12938,7 +7779,7 @@

    Loss of Data

    - +
    TermLossDataIncidentStatus Prefix risk-owl
    LabelLoss of DataIncident Status
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossData
    - https://w3id.org/dpv/risk#LossData + https://w3id.org/dpv/risk/owl/#IncidentStatus
    + https://w3id.org/dpv/risk#IncidentStatus
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionLoss of DataStatus associated with an incident
    Examples Using DPV and RISK extension to represent incidents (E0069) +
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesDex Incident-status
    @@ -12946,25 +7787,25 @@

    Loss of Data

    -
    -

    Loss of Funds

    +
    +

    Incident Status Unknown

    - + - + @@ -12973,31 +7814,22 @@

    Loss of Funds

    - - - - - + - @@ -13008,23 +7840,20 @@

    Loss of Funds

    - + - - - - + - + @@ -13033,7 +7862,7 @@

    Loss of Funds

    - +
    TermLossFundsIncidentStatusUnknown Prefix risk-owl
    LabelLoss of FundsIncident Status Unknown
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossFunds
    - https://w3id.org/dpv/risk#LossFunds + https://w3id.org/dpv/risk/owl/#IncidentStatusUnknown
    + https://w3id.org/dpv/risk#IncidentStatusUnknown
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:MaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionLoss of FundsThe status of a incident is unknown
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesRisk Incident-status
    @@ -13041,25 +7870,25 @@

    Loss of Funds

    -
    -

    Loss of Goods

    +
    +

    Incident Suspected

    - + - + @@ -13068,31 +7897,22 @@

    Loss of Goods

    - - - - - + - @@ -13103,23 +7923,20 @@

    Loss of Goods

    - + - - - - + - + @@ -13128,33 +7945,32 @@

    Loss of Goods

    - +
    TermLossGoodsIncidentSuspected Prefix risk-owl
    LabelLoss of GoodsIncident Suspected
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossGoods
    - https://w3id.org/dpv/risk#LossGoods + https://w3id.org/dpv/risk/owl/#IncidentSuspected
    + https://w3id.org/dpv/risk#IncidentSuspected
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:MaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionLoss of GoodsThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesRisk Incident-status
    - -
    -

    Loss of Goodwill

    +
    +

    Incident Suspected Report

    - + - + @@ -13163,30 +7979,23 @@

    Loss of Goodwill

    - - - - - + - @@ -13197,32 +8006,26 @@

    Loss of Goodwill

    - + - - - - + - + - - - - + - +
    TermLossGoodwillIncidentSuspectedReport Prefix risk-owl
    LabelLoss of GoodwillIncident Suspected Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossGoodwill
    - https://w3id.org/dpv/risk#LossGoodwill + https://w3id.org/dpv/risk/owl/#IncidentSuspectedReport
    + https://w3id.org/dpv/risk#IncidentSuspectedReport
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionLoss of GoodwillA report describing the suspicion of an incident in the past or occuring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -13230,25 +8033,25 @@

    Loss of Goodwill

    -
    -

    Loss of Negotiating Capacity

    +
    +

    Incident Terminated

    - + - + @@ -13257,30 +8060,22 @@

    Loss of Negotiating Capacity

    - - - - - + - @@ -13291,23 +8086,20 @@

    Loss of Negotiating Capacity

    - + - - - - + - + @@ -13316,7 +8108,7 @@

    Loss of Negotiating Capacity

    - +
    TermLossNegotiatingCapacityIncidentTerminated Prefix risk-owl
    LabelLoss of Negotiating CapacityIncident Terminated
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossNegotiatingCapacity
    - https://w3id.org/dpv/risk#LossNegotiatingCapacity + https://w3id.org/dpv/risk/owl/#IncidentTerminated
    + https://w3id.org/dpv/risk#IncidentTerminated
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionLoss of Negotiating CapacityThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-consequencesRisk Incident-status
    @@ -13324,25 +8116,25 @@

    Loss of Negotiating Capacity

    -
    -

    Loss of Opportunity

    +
    +

    Individual Health & Safety

    - + - + @@ -13351,63 +8143,36 @@

    Loss of Opportunity

    - - - - - - - - - + + - - - - + - - - - + - - - - + + - - - - @@ -13417,26 +8182,25 @@

    Loss of Opportunity

    - -
    -

    Loss of Proprietary Information

    +
    +

    Individual Risk

    TermLossOpportunityIndividualHealthSafety Prefix risk-owl
    LabelLoss of OpportunityIndividual Health & Safety
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossOpportunity
    - https://w3id.org/dpv/risk#LossOpportunity + https://w3id.org/dpv/risk/owl/#IndividualHealthSafety
    + https://w3id.org/dpv/risk#IndividualHealthSafety
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IndividualRisk
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionLoss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -13445,33 +8209,13 @@

    Loss of Proprietary Information

    - - - - - - - - - - - + + + @@ -13480,29 +8224,20 @@

    Loss of Proprietary Information

    - + - - - - + - - - - + + - - - - @@ -13513,25 +8248,25 @@

    Loss of Proprietary Information

    -
    -

    Loss of Reputation

    +
    +

    Injury

    TermLossProprietaryInformationIndividualRisk Prefix risk-owl
    LabelLoss of Proprietary InformationIndividual Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossProprietaryInformation
    - https://w3id.org/dpv/risk#LossProprietaryInformation + https://w3id.org/dpv/risk/owl/#IndividualRisk
    + https://w3id.org/dpv/risk#IndividualRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionLoss of Proprietary InformationRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -13540,32 +8275,17 @@

    Loss of Reputation

    - - - - - - - - - + + @@ -13574,7 +8294,7 @@

    Loss of Reputation

    - + @@ -13592,7 +8312,10 @@

    Loss of Reputation

    - + + + + @@ -13607,25 +8330,25 @@

    Loss of Reputation

    -
    -

    Loss of Resources

    +
    +

    None

    TermLossReputationInjury Prefix risk-owl
    LabelLoss of ReputationInjury
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossReputation
    - https://w3id.org/dpv/risk#LossReputation + https://w3id.org/dpv/risk/owl/#Injury
    + https://w3id.org/dpv/risk#Injury
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:IndividualRisk
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionLoss of ReputationSomething that acts as or causes Injury
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -13634,64 +8357,39 @@

    Loss of Resources

    - - - - - - - - - + + - - - - + - - - - + - - - - + + - - - - @@ -13701,26 +8399,25 @@

    Loss of Resources

    - -
    -

    Loss of Suppliers

    +
    +

    Integrity Incident

    TermLossResourcesIntegrityBreach Prefix risk-owl
    LabelLoss of ResourcesNone
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossResources
    - https://w3id.org/dpv/risk#LossResources + https://w3id.org/dpv/risk/owl/#IntegrityBreach
    + https://w3id.org/dpv/risk#IntegrityBreach
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionLoss of Resources
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -13729,31 +8426,19 @@

    Loss of Suppliers

    - - - - - + - @@ -13764,32 +8449,26 @@

    Loss of Suppliers

    - + - - - - + - + - - - - + - +
    TermLossSuppliersIntegrityIncident Prefix risk-owl
    LabelLoss of SuppliersIntegrity Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossSuppliers
    - https://w3id.org/dpv/risk#LossSuppliers + https://w3id.org/dpv/risk/owl/#IntegrityIncident
    + https://w3id.org/dpv/risk#IntegrityIncident
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:Incident + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:hasIncident
    DefinitionLoss of SuppliersIncident where the integrity of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Incident
    @@ -13797,25 +8476,25 @@

    Loss of Suppliers

    -
    -

    Loss of Technological Advantage

    +
    +

    Intentional Misuse

    - + - + @@ -13824,33 +8503,18 @@

    Loss of Technological Advantage

    - - - - - - - - - + + @@ -13859,29 +8523,20 @@

    Loss of Technological Advantage

    - + - - - - + - - - - + + - - - - @@ -13892,25 +8547,25 @@

    Loss of Technological Advantage

    -
    -

    Loss of Trust

    +
    +

    Intercept Communications

    TermLossTechnologicalAdvantageIntentionalMisuse Prefix risk-owl
    LabelLoss of Technological AdvantageIntentional Misuse
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossTechnologicalAdvantage
    - https://w3id.org/dpv/risk#LossTechnologicalAdvantage + https://w3id.org/dpv/risk/owl/#IntentionalMisuse
    + https://w3id.org/dpv/risk#IntentionalMisuse
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:UserRisks + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionLoss of Technological AdvantageIntentional Misuse
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -13919,32 +8574,18 @@

    Loss of Trust

    - - - - - - - - - + + @@ -13953,9 +8594,12 @@

    Loss of Trust

    - + - + + + + @@ -13971,7 +8615,10 @@

    Loss of Trust

    - + + + + @@ -13986,25 +8633,25 @@

    Loss of Trust

    -
    -

    Low Likelihood

    +
    +

    Internal Security Threat

    TermLossTrustInterceptCommunications Prefix risk-owl
    LabelLoss of TrustIntercept Communications
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LossTrust
    - https://w3id.org/dpv/risk#LossTrust + https://w3id.org/dpv/risk/owl/#InterceptCommunications
    + https://w3id.org/dpv/risk#InterceptCommunications
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionLoss of TrustSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -14013,30 +8660,17 @@

    Low Likelihood

    - - - - - - - - - + @@ -14045,12 +8679,9 @@

    Low Likelihood

    - + - - - - + @@ -14059,18 +8690,12 @@

    Low Likelihood

    - - - - + + - - - - - +
    TermLowLikelihoodInternalSecurityThreat Prefix risk-owl
    LabelLow LikelihoodInternal Security Threat
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LowLikelihood
    - https://w3id.org/dpv/risk#LowLikelihood + https://w3id.org/dpv/risk/owl/#InternalSecurityThreat
    + https://w3id.org/dpv/risk#InternalSecurityThreat
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept
    Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is LowConcepts associated with security threats and issues that originate within the organisation
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-consequences
    @@ -14078,25 +8703,29 @@

    Low Likelihood

    -
    -

    Low Risk

    + + + + +
    +

    Judicial Costs

    - + - + @@ -14105,30 +8734,18 @@

    Low Risk

    - - - - - - - - - + @@ -14137,32 +8754,23 @@

    Low Risk

    - + - - - - + - - - - - - - + + + + + - - - - - +
    TermLowRiskJudicialCosts Prefix risk-owl
    LabelLow RiskJudicial Costs
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LowRisk
    - https://w3id.org/dpv/risk#LowRisk + https://w3id.org/dpv/risk/owl/#JudicialCosts
    + https://w3id.org/dpv/risk#JudicialCosts
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept
    Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that involves or causes judicial costs to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-consequences
    @@ -14170,25 +8778,25 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Judicial Penalty

    - + - + @@ -14197,30 +8805,18 @@

    Low Severity

    - - - - - - - - - + @@ -14229,12 +8825,9 @@

    Low Severity

    - + - - - - + @@ -14243,18 +8836,12 @@

    Low Severity

    - - - - + + - - - - - +
    TermLowSeverityJudicialPenalty Prefix risk-owl
    LabelLow SeverityJudicial Penalty
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LowSeverity
    - https://w3id.org/dpv/risk#LowSeverity + https://w3id.org/dpv/risk/owl/#JudicialPenalty
    + https://w3id.org/dpv/risk#JudicialPenalty
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept
    Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is LowSomething that involves or causes judicial penalties to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-consequences
    @@ -14262,25 +8849,25 @@

    Low Severity

    -
    -

    Malicious Code Attack

    +
    +

    Legal Risk

    - + - + @@ -14289,32 +8876,17 @@

    Malicious Code Attack

    - - - - - - - - - + + @@ -14323,29 +8895,20 @@

    Malicious Code Attack

    - + - - - - + - - - - + + - - - - @@ -14356,25 +8919,25 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Lose of Credibility

    TermMaliciousCodeAttackLegalRisk Prefix risk-owl
    LabelMalicious Code AttackLegal Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
    - https://w3id.org/dpv/risk#MaliciousCodeAttack + https://w3id.org/dpv/risk/owl/#LegalRisk
    + https://w3id.org/dpv/risk#LegalRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionIntentional use of software by including or inserting in a system for a harmful purposeRisks and issues that have their basis in legal requirements and enforcement
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -14383,32 +8946,18 @@

    Malware Attack

    - - - - - - - - - + + @@ -14417,7 +8966,7 @@

    Malware Attack

    - + @@ -14426,7 +8975,7 @@

    Malware Attack

    - + @@ -14435,7 +8984,10 @@

    Malware Attack

    - + + + + @@ -14450,25 +9002,25 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Lose of Customer Confidence

    TermMalwareAttackLoseCredibility Prefix risk-owl
    LabelMalware AttackLose of Credibility
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MalwareAttack
    - https://w3id.org/dpv/risk#MalwareAttack + https://w3id.org/dpv/risk/owl/#LoseCredibility
    + https://w3id.org/dpv/risk#LoseCredibility
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionMalware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a systemSomething that acts as or causes Loss of Credibility
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -14477,32 +9029,18 @@

    Material Damage

    - - - - - - - - - + + @@ -14511,22 +9049,28 @@

    Material Damage

    - + - + + + + - + - + + + + @@ -14541,25 +9085,25 @@

    Material Damage

    -
    -

    Misinformation and Disinformation

    +
    +

    Lose of Goodwill

    TermMaterialDamageLoseCustomerConfidence Prefix risk-owl
    LabelMaterial DamageLose of Customer Confidence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MaterialDamage
    - https://w3id.org/dpv/risk#MaterialDamage + https://w3id.org/dpv/risk/owl/#LoseCustomerConfidence
    + https://w3id.org/dpv/risk#LoseCustomerConfidence
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionImpact that acts as or causes material damagesSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-03-302022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -14568,32 +9112,18 @@

    Misinformation and Disinformation

    - - - - - - - - - + + @@ -14602,7 +9132,7 @@

    Misinformation and Disinformation

    - + @@ -14611,7 +9141,7 @@

    Misinformation and Disinformation

    - + @@ -14620,7 +9150,10 @@

    Misinformation and Disinformation

    - + + + + @@ -14635,25 +9168,25 @@

    Misinformation and Disinformation

    -
    -

    Misuse

    +
    +

    Lose of Negotiating Capacity

    TermMisinformationDisinformationLoseGoodwill Prefix risk-owl
    LabelMisinformation and DisinformationLose of Goodwill
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MisinformationDisinformation
    - https://w3id.org/dpv/risk#MisinformationDisinformation + https://w3id.org/dpv/risk/owl/#LoseGoodwill
    + https://w3id.org/dpv/risk#LoseGoodwill
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionInformation that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)Something that acts as or causes Loss of Goodwill
    SourceENISA Threat Landscape 2021ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -14662,31 +9195,18 @@

    Misuse

    - - - - - - - - - + + @@ -14695,25 +9215,31 @@

    Misuse

    - + - + + + + - + - + + + + - + @@ -14725,25 +9251,25 @@

    Misuse

    -
    -

    Misuse of Breached Information

    +
    +

    Lose of Opportunity

    TermMisuseLoseNegotiatingCapacity Prefix risk-owl
    LabelMisuseLose of Negotiating Capacity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Misuse
    - https://w3id.org/dpv/risk#Misuse + https://w3id.org/dpv/risk/owl/#LoseNegotiatingCapacity
    + https://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionMisuseSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-06-112022-08-17
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    Documented in
    - + - + @@ -14752,32 +9278,18 @@

    Misuse of Breached Information

    - - - - - - - - - + + @@ -14786,7 +9298,7 @@

    Misuse of Breached Information

    - + @@ -14804,7 +9316,10 @@

    Misuse of Breached Information

    - + + + + @@ -14819,25 +9334,25 @@

    Misuse of Breached Information

    -
    -

    Moderate Likelihood

    +
    +

    Lose of Reputation

    TermMisuseBreachedInformationLoseOpportunity Prefix risk-owl
    LabelMisuse of Breached InformationLose of Opportunity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MisuseBreachedInformation
    - https://w3id.org/dpv/risk#MisuseBreachedInformation + https://w3id.org/dpv/risk/owl/#LoseOpportunity
    + https://w3id.org/dpv/risk#LoseOpportunity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionMisuse of Breached InformationSomething that acts as or causes Loss of Opportunity
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -14846,30 +9361,18 @@

    Moderate Likelihood

    - - - - - - - - - + @@ -14878,32 +9381,35 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + + + + - +
    TermModerateLikelihoodLoseReputation Prefix risk-owl
    LabelModerate LikelihoodLose of Reputation
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ModerateLikelihood
    - https://w3id.org/dpv/risk#ModerateLikelihood + https://w3id.org/dpv/risk/owl/#LoseReputation
    + https://w3id.org/dpv/risk#LoseReputation
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept
    Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateSomething that acts as or causes Loss of Reputation
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-consequences
    @@ -14911,25 +9417,25 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    +
    +

    Lose of Trust

    - + - + @@ -14938,30 +9444,18 @@

    Moderate Risk

    - - - - - - - - - + @@ -14970,32 +9464,35 @@

    Moderate Risk

    - + - - - - + - + + + + - + - + + + + - +
    TermModerateRiskLoseTrust Prefix risk-owl
    LabelModerate RiskLose of Trust
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ModerateRisk
    - https://w3id.org/dpv/risk#ModerateRisk + https://w3id.org/dpv/risk/owl/#LoseTrust
    + https://w3id.org/dpv/risk#LoseTrust
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept
    Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Loss of Trust
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-consequences
    @@ -15003,25 +9500,25 @@

    Moderate Risk

    -
    -

    Moderate Severity

    +
    +

    Low Likelihood

    - + - + @@ -15030,28 +9527,28 @@

    Moderate Severity

    - - - - @@ -15062,11 +9559,11 @@

    Moderate Severity

    - + - + @@ -15095,25 +9592,25 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Low Risk

    TermModerateSeverityLowLikelihood Prefix risk-owl
    LabelModerate SeverityLow Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ModerateSeverity
    - https://w3id.org/dpv/risk#ModerateSeverity + https://w3id.org/dpv/risk/owl/#LowLikelihood
    + https://w3id.org/dpv/risk#LowLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:Likelihood
    Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity + risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Range of dpv-owl:hasSeverity + dpv-owl:hasLikelihood
    DefinitionLevel where Severity is ModerateLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    - + - + @@ -15122,24 +9619,28 @@

    Monitor Consequence

    - + + + + - @@ -15150,9 +9651,12 @@

    Monitor Consequence

    - + - + + + + @@ -15163,7 +9667,7 @@

    Monitor Consequence

    - + @@ -15172,7 +9676,7 @@

    Monitor Consequence

    - +
    TermMonitorConsequenceLowRisk Prefix risk-owl
    LabelMonitor ConsequenceLow Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorConsequence
    - https://w3id.org/dpv/risk#MonitorConsequence + https://w3id.org/dpv/risk/owl/#LowRisk
    + https://w3id.org/dpv/risk#LowRisk
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskLevel
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasRiskLevel
    DefinitionControl that monitors a Risk ConsequenceLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    Documented inRisk Risk-controlsRisk Risk-levels
    @@ -15180,25 +9684,25 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Low Severity

    - + - + @@ -15207,23 +9711,28 @@

    Monitor Control

    - + + + + - @@ -15234,11 +9743,11 @@

    Monitor Control

    - + - + @@ -15250,7 +9759,7 @@

    Monitor Control

    - + @@ -15259,7 +9768,7 @@

    Monitor Control

    - +
    TermMonitorControlLowSeverity Prefix risk-owl
    LabelMonitor ControlLow Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorControl
    - https://w3id.org/dpv/risk#MonitorControl + https://w3id.org/dpv/risk/owl/#LowSeverity
    + https://w3id.org/dpv/risk#LowSeverity
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:Severity
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasSeverity
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsLevel where Severity is Low
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    Documented inRisk Risk-controlsRisk Risk-levels
    @@ -15267,25 +9776,25 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Malicious Code Attack

    - + - + @@ -15294,26 +9803,18 @@

    Monitor Impact

    - - - - - + @@ -15322,29 +9823,35 @@

    Monitor Impact

    - + - + + + + - + - + + + + - +
    TermMonitorImpactMaliciousCodeAttack Prefix risk-owl
    LabelMonitor ImpactMalicious Code Attack
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorImpact
    - https://w3id.org/dpv/risk#MonitorImpact + https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
    + https://w3id.org/dpv/risk#MaliciousCodeAttack
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a Risk ImpactSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -15352,25 +9859,25 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Malware Attack

    - + - + @@ -15379,26 +9886,18 @@

    Monitor Risk

    - - - - - + @@ -15407,29 +9906,35 @@

    Monitor Risk

    - + - + + + + - + - + + + + - +
    TermMonitorRiskMalwareAttack Prefix risk-owl
    LabelMonitor RiskMalware Attack
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorRisk
    - https://w3id.org/dpv/risk#MonitorRisk + https://w3id.org/dpv/risk/owl/#MalwareAttack
    + https://w3id.org/dpv/risk#MalwareAttack
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a RiskSomething that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -15437,25 +9942,25 @@

    Monitor Risk

    -
    -

    Monitor Control

    +
    +

    Material Damage

    - + - + @@ -15464,26 +9969,18 @@

    Monitor Control

    - - - - - + @@ -15492,9 +9989,12 @@

    Monitor Control

    - + - + + + + @@ -15505,16 +10005,19 @@

    Monitor Control

    - + - + + + + - +
    TermMonitorRiskControlMaterialDamage Prefix risk-owl
    LabelMonitor ControlMaterial Damage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorRiskControl
    - https://w3id.org/dpv/risk#MonitorRiskControl + https://w3id.org/dpv/risk/owl/#MaterialDamage
    + https://w3id.org/dpv/risk#MaterialDamage
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -15522,25 +10025,25 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    +
    +

    Misuse

    - + - + @@ -15549,26 +10052,18 @@

    Monitor Risk Source

    - - - - - + @@ -15577,7 +10072,7 @@

    Monitor Risk Source

    - + @@ -15590,16 +10085,19 @@

    Monitor Risk Source

    - + - + + + + - + - +
    TermMonitorRiskSourceMisuse Prefix risk-owl
    LabelMonitor Risk SourceMisuse
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorRiskSource
    - https://w3id.org/dpv/risk#MonitorRiskSource + https://w3id.org/dpv/risk/owl/#Misuse
    + https://w3id.org/dpv/risk#Misuse
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:UserRisks + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a Risk SourceSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -15607,25 +10105,25 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    +
    +

    Moderate Likelihood

    - + - + @@ -15634,24 +10132,28 @@

    Monitor Vulnerabilities

    - + + + + - @@ -15662,9 +10164,12 @@

    Monitor Vulnerabilities

    - + - + + + + @@ -15675,7 +10180,7 @@

    Monitor Vulnerabilities

    - + @@ -15684,7 +10189,7 @@

    Monitor Vulnerabilities

    - +
    TermMonitorVulnerabilitiesModerateLikelihood Prefix risk-owl
    LabelMonitor VulnerabilitiesModerate Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorVulnerabilities
    - https://w3id.org/dpv/risk#MonitorVulnerabilities + https://w3id.org/dpv/risk/owl/#ModerateLikelihood
    + https://w3id.org/dpv/risk#ModerateLikelihood
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:Likelihood
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasLikelihood
    DefinitionControl that monitors a Risk VulnerabilityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    Documented inRisk Risk-controlsRisk Risk-levels
    @@ -15692,25 +10197,25 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    +
    +

    Moderate Risk

    - + - + @@ -15719,30 +10224,28 @@

    Non-Material Damage

    - + + + + - - - - + - @@ -15753,9 +10256,12 @@

    Non-Material Damage

    - + - + + + + @@ -15766,7 +10272,7 @@

    Non-Material Damage

    - + @@ -15775,7 +10281,7 @@

    Non-Material Damage

    - +
    TermNonMaterialDamageModerateRisk Prefix risk-owl
    LabelNon-Material DamageModerate Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#NonMaterialDamage
    - https://w3id.org/dpv/risk#NonMaterialDamage + https://w3id.org/dpv/risk/owl/#ModerateRisk
    + https://w3id.org/dpv/risk#ModerateRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskLevel
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasRiskLevel
    DefinitionImpact that acts as or causes non-material damagesLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -15783,25 +10289,25 @@

    Non-Material Damage

    -
    -

    Organisation Disruption

    +
    +

    Moderate Severity

    - + - + @@ -15810,30 +10316,28 @@

    Organisation Disruption

    - + + + + - - - - + - @@ -15844,23 +10348,23 @@

    Organisation Disruption

    - + - + + + + - - - - + - + @@ -15869,7 +10373,7 @@

    Organisation Disruption

    - +
    TermOrganisationDisruptionModerateSeverity Prefix risk-owl
    LabelOrganisation DisruptionModerate Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#OrganisationDisruption
    - https://w3id.org/dpv/risk#OrganisationDisruption + https://w3id.org/dpv/risk/owl/#ModerateSeverity
    + https://w3id.org/dpv/risk#ModerateSeverity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:Severity
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:3SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasSeverity
    DefinitionOrganisation DisruptionLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-consequencesRisk Risk-levels
    @@ -15877,25 +10381,25 @@

    Organisation Disruption

    -
    -

    Payment

    +
    +

    Monitor Consequence

    - + - + @@ -15904,27 +10408,24 @@

    Payment

    - - - - - + - @@ -15935,7 +10436,7 @@

    Payment

    - + @@ -15948,16 +10449,16 @@

    Payment

    - + - + - +
    TermPaymentMonitorConsequence Prefix risk-owl
    LabelPaymentMonitor Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Payment
    - https://w3id.org/dpv/risk#Payment + https://w3id.org/dpv/risk/owl/#MonitorConsequence
    + https://w3id.org/dpv/risk#MonitorConsequence
    Type rdfs:Class , owl:Class - , dpv-owl:Impact + , risk-owl:RiskControl
    Sub-class of risk-owl:Compensation - → risk-owl:Benefit - → dpv-owl:Impact - → dpv-owl:Consequence + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasImpactOn -
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionPayment provided as compensation (as an impact)Control that monitors a Risk Consequence
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -15965,25 +10466,25 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Monitor Control

    - + - + @@ -15992,31 +10493,23 @@

    Personal Safety Endangerment

    - - - - - + - @@ -16027,23 +10520,23 @@

    Personal Safety Endangerment

    - + - + + + + - - - - + - + @@ -16052,7 +10545,7 @@

    Personal Safety Endangerment

    - +
    TermPersonalSafetyEndangermentMonitorControl Prefix risk-owl
    LabelPersonal Safety EndangermentMonitor Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PersonalSafetyEndangerment
    - https://w3id.org/dpv/risk#PersonalSafetyEndangerment + https://w3id.org/dpv/risk/owl/#MonitorControl
    + https://w3id.org/dpv/risk#MonitorControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionPersonal Safety EndangermentRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -16060,25 +10553,25 @@

    Personal Safety Endangerment

    -
    -

    Personnel Absence

    +
    +

    Monitor Impact

    - + - + @@ -16087,31 +10580,24 @@

    Personnel Absence

    - - - - - + - @@ -16122,23 +10608,20 @@

    Personnel Absence

    - + - - - - + - + @@ -16147,7 +10630,7 @@

    Personnel Absence

    - +
    TermPersonnelAbsenceMonitorImpact Prefix risk-owl
    LabelPersonnel AbsenceMonitor Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PersonnelAbsence
    - https://w3id.org/dpv/risk#PersonnelAbsence + https://w3id.org/dpv/risk/owl/#MonitorImpact
    + https://w3id.org/dpv/risk#MonitorImpact
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionPersonnel AbsenceControl that monitors a Risk Impact
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -16155,25 +10638,25 @@

    Personnel Absence

    -
    -

    Phishing Scam

    +
    +

    Monitor Risk

    - + - + @@ -16182,31 +10665,24 @@

    Phishing Scam

    - - - - - + - @@ -16217,23 +10693,20 @@

    Phishing Scam

    - + - - - - + - + @@ -16242,7 +10715,7 @@

    Phishing Scam

    - +
    TermPhishingScamMonitorRisk Prefix risk-owl
    LabelPhishing ScamMonitor Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhishingScam
    - https://w3id.org/dpv/risk#PhishingScam + https://w3id.org/dpv/risk/owl/#MonitorRisk
    + https://w3id.org/dpv/risk#MonitorRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionA type of social engineering attack involving deceptive messages intended to reveal sensitive informationControl that monitors a Risk
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -16250,25 +10723,25 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Monitor Control

    - + - + @@ -16277,31 +10750,24 @@

    Physical Assault

    - - - - - + - @@ -16312,23 +10778,20 @@

    Physical Assault

    - + - - - - + - + @@ -16337,7 +10800,7 @@

    Physical Assault

    - +
    TermPhysicalAssaultMonitorRiskControl Prefix risk-owl
    LabelPhysical AssaultMonitor Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhysicalAssault
    - https://w3id.org/dpv/risk#PhysicalAssault + https://w3id.org/dpv/risk/owl/#MonitorRiskControl
    + https://w3id.org/dpv/risk#MonitorRiskControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionPhysical AssaultControl that monitors another Control
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -16345,25 +10808,25 @@

    Physical Assault

    -
    -

    Physical Spying

    +
    +

    Monitor Risk Source

    - + - + @@ -16372,31 +10835,24 @@

    Physical Spying

    - - - - - + - @@ -16407,23 +10863,20 @@

    Physical Spying

    - + - - - - + - + @@ -16432,7 +10885,7 @@

    Physical Spying

    - +
    TermPhysicalSpyingMonitorRiskSource Prefix risk-owl
    LabelPhysical SpyingMonitor Risk Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhysicalSpying
    - https://w3id.org/dpv/risk#PhysicalSpying + https://w3id.org/dpv/risk/owl/#MonitorRiskSource
    + https://w3id.org/dpv/risk#MonitorRiskSource
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionPhysical SpyingControl that monitors a Risk Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -16440,25 +10893,25 @@

    Physical Spying

    -
    -

    Physical Stalking

    +
    +

    Monitor Vulnerabilities

    - + - + @@ -16467,31 +10920,24 @@

    Physical Stalking

    - - - - - + - @@ -16502,23 +10948,20 @@

    Physical Stalking

    - + - - - - + - + @@ -16527,7 +10970,7 @@

    Physical Stalking

    - +
    TermPhysicalStalkingMonitorVulnerabilities Prefix risk-owl
    LabelPhysical StalkingMonitor Vulnerabilities
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhysicalStalking
    - https://w3id.org/dpv/risk#PhysicalStalking + https://w3id.org/dpv/risk/owl/#MonitorVulnerabilities
    + https://w3id.org/dpv/risk#MonitorVulnerabilities
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionPhysical StalkingControl that monitors a Risk Vulnerability
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -16535,25 +10978,25 @@

    Physical Stalking

    -
    -

    Prevent Exercising of Rights

    +
    +

    Non-Material Damage

    - + - + @@ -16562,33 +11005,18 @@

    Prevent Exercising of Rights

    - - - - - - - - - + + @@ -16597,9 +11025,12 @@

    Prevent Exercising of Rights

    - + - + + + + @@ -16610,12 +11041,15 @@

    Prevent Exercising of Rights

    - + - + + + + - + @@ -16627,25 +11061,25 @@

    Prevent Exercising of Rights

    -
    -

    Privacy impact

    +
    +

    Operational Security Risk

    TermPreventExercisingOfRightsNonMaterialDamage Prefix risk-owl
    LabelPrevent Exercising of RightsNon-Material Damage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PreventExercisingOfRights
    - https://w3id.org/dpv/risk#PreventExercisingOfRights + https://w3id.org/dpv/risk/owl/#NonMaterialDamage
    + https://w3id.org/dpv/risk#NonMaterialDamage
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionPrevent Exercising of RightsSomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-08-182022-03-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented in
    - + - + @@ -16654,31 +11088,17 @@

    Privacy impact

    - - - - - - - - - + + @@ -16687,29 +11107,20 @@

    Privacy impact

    - + - - - - + - - - - + + - - - - @@ -16720,25 +11131,25 @@

    Privacy impact

    -
    -

    Psychological Harm

    +
    +

    Payment

    TermPrivacyImpactOperationalSecurityRisk Prefix risk-owl
    LabelPrivacy impactOperational Security Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PrivacyImpact
    - https://w3id.org/dpv/risk#PrivacyImpact + https://w3id.org/dpv/risk/owl/#OperationalSecurityRisk
    + https://w3id.org/dpv/risk#OperationalSecurityRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionPrivacy impactRisks and issues that arise during operational processes
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -16747,33 +11158,18 @@

    Psychological Harm

    - - - - - - - - - + + @@ -16782,28 +11178,28 @@

    Psychological Harm

    - + - - - - + - + - + + + + - + @@ -16815,25 +11211,25 @@

    Psychological Harm

    -
    -

    Public Order Breach

    +
    +

    Personal Safety Endangerment

    TermPsychologicalHarmPayment Prefix risk-owl
    LabelPsychological HarmPayment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PsychologicalHarm
    - https://w3id.org/dpv/risk#PsychologicalHarm + https://w3id.org/dpv/risk/owl/#Payment
    + https://w3id.org/dpv/risk#Payment
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionPsychological HarmSomething that acts as or provides payment e.g. to access a service or purchase resources
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented in
    - + - + @@ -16842,32 +11238,18 @@

    Public Order Breach

    - - - - - - - - - + + @@ -16876,7 +11258,7 @@

    Public Order Breach

    - + @@ -16894,7 +11276,10 @@

    Public Order Breach

    - + + + + @@ -16909,25 +11294,25 @@

    Public Order Breach

    -
    -

    Ransomware Attack

    +
    +

    Phishing Scam

    TermPublicOrderBreachPersonalSafetyEndangerment Prefix risk-owl
    LabelPublic Order BreachPersonal Safety Endangerment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PublicOrderBreach
    - https://w3id.org/dpv/risk#PublicOrderBreach + https://w3id.org/dpv/risk/owl/#PersonalSafetyEndangerment
    + https://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionPublic Order BreachSomething that acts as or causes Personal Safety Endangerment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -16936,33 +11321,18 @@

    Ransomware Attack

    - - - - - - - - - + + @@ -16971,7 +11341,7 @@

    Ransomware Attack

    - + @@ -16980,7 +11350,7 @@

    Ransomware Attack

    - + @@ -16989,7 +11359,10 @@

    Ransomware Attack

    - + + + + @@ -17004,25 +11377,25 @@

    Ransomware Attack

    -
    -

    Recovery Control

    +
    +

    Physical Assault

    TermRansomwareAttackPhishingScam Prefix risk-owl
    LabelRansomware AttackPhishing Scam
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RansomwareAttack
    - https://w3id.org/dpv/risk#RansomwareAttack + https://w3id.org/dpv/risk/owl/#PhishingScam
    + https://w3id.org/dpv/risk#PhishingScam
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionRansomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentialitySomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022,ISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -17031,25 +11404,17 @@

    Recovery Control

    - - - - - + @@ -17058,26 +11423,35 @@

    Recovery Control

    - + - + + + + - + - - + + + + + + + + - +
    TermRecoveryControlPhysicalAssault Prefix risk-owl
    LabelRecovery ControlPhysical Assault
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RecoveryControl
    - https://w3id.org/dpv/risk#RecoveryControl + https://w3id.org/dpv/risk/owl/#PhysicalAssault
    + https://w3id.org/dpv/risk#PhysicalAssault
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IndividualRisk
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to recover from eventSomething that acts as or causes Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -17085,25 +11459,25 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Physical Harm

    - + - + @@ -17112,36 +11486,24 @@

    Reduce Likelihood

    - - - - - + - - - - + @@ -17151,18 +11513,12 @@

    Reduce Likelihood

    - - - - + + - - - - - +
    TermReduceLikelihoodPhysicalHarm Prefix risk-owl
    LabelReduce LikelihoodPhysical Harm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReduceLikelihood
    - https://w3id.org/dpv/risk#ReduceLikelihood + https://w3id.org/dpv/risk/owl/#PhysicalHarm
    + https://w3id.org/dpv/risk#PhysicalHarm
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:ReductionControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IndividualRisk
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the likelihood of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -17170,25 +11526,25 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Privacy

    - + - + @@ -17197,36 +11553,24 @@

    Reduce Severity

    - - - - - + - - - - + @@ -17236,18 +11580,12 @@

    Reduce Severity

    - - - - + + - - - - - +
    TermReduceSeverityPrivacy Prefix risk-owl
    LabelReduce SeverityPrivacy
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReduceSeverity
    - https://w3id.org/dpv/risk#ReduceSeverity + https://w3id.org/dpv/risk/owl/#Privacy
    + https://w3id.org/dpv/risk#Privacy
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:ReductionControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IndividualRisk
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the severity of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -17255,25 +11593,25 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Psychological Harm

    - + - + @@ -17282,25 +11620,17 @@

    Reduction Control

    - - - - - + @@ -17309,26 +11639,35 @@

    Reduction Control

    - + - + + + + - + - - + + + + + + + + - +
    TermReductionControlPsychologicalHarm Prefix risk-owl
    LabelReduction ControlPsychological Harm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReductionControl
    - https://w3id.org/dpv/risk#ReductionControl + https://w3id.org/dpv/risk/owl/#PsychologicalHarm
    + https://w3id.org/dpv/risk#PsychologicalHarm
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IndividualRisk
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or causes Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -17336,27 +11675,25 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Public Order Breach

    - + - + @@ -17365,31 +11702,18 @@

    Re-identification

    - - - - - - - - - + + @@ -17398,22 +11722,28 @@

    Re-identification

    - + - + + + + - + - + + + + @@ -17428,25 +11758,25 @@

    Re-identification

    -
    -

    Remedy Control

    +
    +

    Recovery Control

    TermReidentificationPublicOrderBreach Prefix risk-owl
    LabelRe-identificationPublic Order Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Reidentification
    - https://w3id.org/dpv/risk#Reidentification + https://w3id.org/dpv/risk/owl/#PublicOrderBreach
    + https://w3id.org/dpv/risk#PublicOrderBreach
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionRe-identificationSomething that acts as or causes Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -17482,7 +11812,7 @@

    Remedy Control

    - + @@ -17509,25 +11839,25 @@

    Remedy Control

    -
    -

    Remote Spying

    +
    +

    Reduce Likelihood

    TermRemedyControlRecoveryControl Prefix risk-owl
    LabelRemedy ControlRecovery Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemedyControl
    - https://w3id.org/dpv/risk#RemedyControl + https://w3id.org/dpv/risk/owl/#RecoveryControl
    + https://w3id.org/dpv/risk#RecoveryControl
    DefinitionControl to remedy consequences of eventControl to recover from event
    - + - + @@ -17536,31 +11866,24 @@

    Remote Spying

    - - - - - + - @@ -17571,23 +11894,20 @@

    Remote Spying

    - + - - - - + - + @@ -17596,7 +11916,7 @@

    Remote Spying

    - +
    TermRemoteSpyingReduceLikelihood Prefix risk-owl
    LabelRemote SpyingReduce Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoteSpying
    - https://w3id.org/dpv/risk#RemoteSpying + https://w3id.org/dpv/risk/owl/#ReduceLikelihood
    + https://w3id.org/dpv/risk#ReduceLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ReductionControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionRemote SpyingControl that reduces the likelihood of an event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -17604,25 +11924,25 @@

    Remote Spying

    -
    -

    Remove Consequence

    +
    +

    Reduce Severity

    - + - + @@ -17637,7 +11957,7 @@

    Remove Consequence

    - - + @@ -17689,25 +12009,25 @@

    Remove Consequence

    -
    -

    Remove Impact

    +
    +

    Reduction Control

    TermRemoveConsequenceReduceSeverity Prefix risk-owl
    LabelRemove ConsequenceReduce Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveConsequence
    - https://w3id.org/dpv/risk#RemoveConsequence + https://w3id.org/dpv/risk/owl/#ReduceSeverity
    + https://w3id.org/dpv/risk#ReduceSeverity
    Sub-class of risk-owl:ConsequenceControl + risk-owl:ReductionControlrisk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure @@ -17659,7 +11979,7 @@

    Remove Consequence

    DefinitionControl that removes Consequence i.e. prevents it from materialisingControl that reduces the severity of an event
    - + - + @@ -17722,8 +12042,7 @@

    Remove Impact

    - @@ -17744,7 +12063,7 @@

    Remove Impact

    - + @@ -17760,10 +12079,7 @@

    Remove Impact

    - - - - + @@ -17774,25 +12090,27 @@

    Remove Impact

    -
    -

    Remove Source

    + + +
    +

    Re-identification

    TermRemoveImpactReductionControl Prefix risk-owl
    LabelRemove ImpactReduction Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveImpact
    - https://w3id.org/dpv/risk#RemoveImpact + https://w3id.org/dpv/risk/owl/#ReductionControl
    + https://w3id.org/dpv/risk#ReductionControl
    Sub-class of risk-owl:ImpactControl - → risk-owl:RiskControl + risk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure
    DefinitionControl that removes Impact i.e. prevents it from materialisingControl that reduces the likelihood or severity of an event
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-controls
    - + - + @@ -17801,26 +12119,18 @@

    Remove Source

    - - - - - + @@ -17829,9 +12139,12 @@

    Remove Source

    - + - + + + + @@ -17842,16 +12155,19 @@

    Remove Source

    - + - + + + + - +
    TermRemoveSourceReidentification Prefix risk-owl
    LabelRemove SourceRe-identification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveSource
    - https://w3id.org/dpv/risk#RemoveSource + https://w3id.org/dpv/risk/owl/#Reidentification
    + https://w3id.org/dpv/risk#Reidentification
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:SourceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that removes the risk sourceSomething that acts as or causes Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2024-05-192022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -17859,25 +12175,25 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Remedy Control

    - + - + @@ -17886,27 +12202,23 @@

    Remuneration

    - - - - - + - @@ -17917,7 +12229,7 @@

    Remuneration

    - + @@ -17930,16 +12242,13 @@

    Remuneration

    - + - - - - + - +
    TermRenumerationRemedyControl Prefix risk-owl
    LabelRemunerationRemedy Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Renumeration
    - https://w3id.org/dpv/risk#Renumeration + https://w3id.org/dpv/risk/owl/#RemedyControl
    + https://w3id.org/dpv/risk#RemedyControl
    Type rdfs:Class , owl:Class - , dpv-owl:Impact + , risk-owl:RiskControl
    Sub-class of risk-owl:Compensation - → risk-owl:Benefit - → dpv-owl:Impact - → dpv-owl:Consequence + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasImpactOn -
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionRenumeration provided as compensation (as an impact)Control to remedy consequences of event
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -17947,25 +12256,25 @@

    Remuneration

    -
    -

    Replacement Costs

    +
    +

    Remove Consequence

    - + - + @@ -17974,30 +12283,24 @@

    Replacement Costs

    - - - - - + - @@ -18008,23 +12311,20 @@

    Replacement Costs

    - + - - - - + - + @@ -18033,7 +12333,7 @@

    Replacement Costs

    - +
    TermReplacementCostsRemoveConsequence Prefix risk-owl
    LabelReplacement CostsRemove Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReplacementCosts
    - https://w3id.org/dpv/risk#ReplacementCosts + https://w3id.org/dpv/risk/owl/#RemoveConsequence
    + https://w3id.org/dpv/risk#RemoveConsequence
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ConsequenceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionReplacement CostsControl that removes Consequence i.e. prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -18041,25 +12341,25 @@

    Replacement Costs

    -
    -

    Reputation and trust impact

    +
    +

    Remove Impact

    - + - + @@ -18068,29 +12368,24 @@

    Reputation and trust impact

    - - - - - + - @@ -18101,23 +12396,20 @@

    Reputation and trust impact

    - + - - - - + - + @@ -18126,7 +12418,7 @@

    Reputation and trust impact

    - +
    TermReputationTrustImpactRemoveImpact Prefix risk-owl
    LabelReputation and trust impactRemove Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReputationTrustImpact
    - https://w3id.org/dpv/risk#ReputationTrustImpact + https://w3id.org/dpv/risk/owl/#RemoveImpact
    + https://w3id.org/dpv/risk#RemoveImpact
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of dpv-owl:Risk + risk-owl:ImpactControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionReputation and trust impactControl that removes Impact i.e. prevents it from materialising
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -18134,25 +12426,25 @@

    Reputation and trust impact

    -
    -

    Retrieval of Deleted Data

    +
    +

    Remove Source

    - + - + @@ -18161,30 +12453,24 @@

    Retrieval of Deleted Data

    - - - - - + - @@ -18195,23 +12481,20 @@

    Retrieval of Deleted Data

    - + - - - - + - + @@ -18220,7 +12503,7 @@

    Retrieval of Deleted Data

    - +
    TermRetrievalDeletedDataRemoveSource Prefix risk-owl
    LabelRetrieval of Deleted DataRemove Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RetrievalDeletedData
    - https://w3id.org/dpv/risk#RetrievalDeletedData + https://w3id.org/dpv/risk/owl/#RemoveSource
    + https://w3id.org/dpv/risk#RemoveSource
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:SourceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionRetrieval of Deleted DataControl that removes the risk source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -18228,25 +12511,25 @@

    Retrieval of Deleted Data

    -
    -

    Retrieval of Discarded Equipment

    +
    +

    Remuneration

    - + - + @@ -18255,32 +12538,18 @@

    Retrieval of Discarded Equipment

    - - - - - - - - - + + @@ -18289,28 +12558,28 @@

    Retrieval of Discarded Equipment

    - + - - - - + - + - + + + + - + @@ -18322,25 +12591,25 @@

    Retrieval of Discarded Equipment

    -
    -

    Reward

    +
    +

    Reputational Risk

    TermRetrievalDiscardedEquipmentRenumeration Prefix risk-owl
    LabelRetrieval of Discarded EquipmentRemuneration
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RetrievalDiscardedEquipment
    - https://w3id.org/dpv/risk#RetrievalDiscardedEquipment + https://w3id.org/dpv/risk/owl/#Renumeration
    + https://w3id.org/dpv/risk#Renumeration
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionRetrieval of Discarded EquipmentSomething that acts as or provides renumeration which is in monetary or financial form
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented in
    - + - + @@ -18349,29 +12618,17 @@

    Reward

    - - - - - - - - - + + @@ -18380,7 +12637,7 @@

    Reward

    - + @@ -18391,15 +12648,9 @@

    Reward

    - - - - + + - - - - @@ -18407,31 +12658,28 @@

    Reward

    TermRewardReputationalRisk Prefix risk-owl
    LabelRewardReputational Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Reward
    - https://w3id.org/dpv/risk#Reward + https://w3id.org/dpv/risk/owl/#ReputationalRisk
    + https://w3id.org/dpv/risk#ReputationalRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Impact + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Compensation - → risk-owl:Benefit - → dpv-owl:Impact - → dpv-owl:Consequence + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasImpactOn -
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact -
    DefinitionReward provided as compensation (as an impact)Risks and issues that affect the reputation of the organisation
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - - - - -
    -

    Risk Analysis

    + +
    +

    Reward

    - + - + @@ -18440,13 +12688,14 @@

    Risk Analysis

    - @@ -18459,57 +12708,58 @@

    Risk Analysis

    - + - - - - + - + - + + + + - + - +
    TermRiskAnalysisReward Prefix risk-owl
    LabelRisk AnalysisReward
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskAnalysis
    - https://w3id.org/dpv/risk#RiskAnalysis + https://w3id.org/dpv/risk/owl/#Reward
    + https://w3id.org/dpv/risk#Reward
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    SourceIEC 31010:2019
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-consequences
    -
    -

    Risk Assessment

    + +
    +

    Prevent Exercising of Rights

    - + - + @@ -18518,12 +12768,14 @@

    Risk Assessment

    - @@ -18536,54 +12788,61 @@

    Risk Assessment

    - + - + + + + - - - - + - + - - + + + + + + + + - +
    TermRiskAssessmentRightsExercisePrevention Prefix risk-owl
    LabelRisk AssessmentPrevent Exercising of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskAssessment
    - https://w3id.org/dpv/risk#RiskAssessment + https://w3id.org/dpv/risk/owl/#RightsExercisePrevention
    + https://w3id.org/dpv/risk#RightsExercisePrevention
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskManagement + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionAssessment of risk involving its identification, analysis, and evaluationSomething that acts as or causes Prevent Exercising of Rights
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Source
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-consequences
    -
    -

    Risk Control

    + +
    +

    Impact to Rights

    - + - + @@ -18592,21 +12851,26 @@

    Risk Control

    - + + - @@ -18617,55 +12881,64 @@

    Risk Control

    - + + + + + - - - - - + + + + - + - - + + + + + + + + - +
    TermRiskControlRightsImpact Prefix risk-owl
    LabelRisk ControlImpact to Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskControl
    - https://w3id.org/dpv/risk#RiskControl + https://w3id.org/dpv/risk/owl/#RightsImpact
    + https://w3id.org/dpv/risk#RightsImpact
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + dpv-owl:Impact + → dpv-owl:Consequence + → dpv-owl:RiskConcept +
    Sub-class of risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasConsequence, + dpv-owl:hasImpact
    DefinitionControl that modifies riskSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    Examples Using risk controls to express how tech/org measures address the risk (E0071) -
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inDex Risk-controlsRisk Risk-consequences
    -
    -

    Risk Management

    + +
    +

    Limitation of Rights

    - + - + @@ -18674,10 +12947,15 @@

    Risk Management

    - + + + @@ -18689,29 +12967,35 @@

    Risk Management

    - + - + + + + - - - - + - + - - + + + + + + + + - +
    TermRiskManagementRightsLimitation Prefix risk-owl
    LabelRisk ManagementLimitation of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskManagement
    - https://w3id.org/dpv/risk#RiskManagement + https://w3id.org/dpv/risk/owl/#RightsLimitation
    + https://w3id.org/dpv/risk#RightsLimitation
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskSomething that acts as or causes Limitation of Rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Source
    Date Created2024-06-122022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-consequences
    @@ -18719,25 +13003,25 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Violation of Rights

    - + - + @@ -18746,14 +13030,14 @@

    Risk Matrix

    - @@ -18766,58 +13050,64 @@

    Risk Matrix

    - + - + + + + - - - - + - + - + + + + - + - +
    TermRiskMatrixRightsViolation Prefix risk-owl
    LabelRisk MatrixViolation of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix
    - https://w3id.org/dpv/risk#RiskMatrix + https://w3id.org/dpv/risk/owl/#RightsViolation
    + https://w3id.org/dpv/risk#RightsViolation
    Type rdfs:Class , owl:Class - , risk-owl:RiskAssessment + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Something that acts as or causes Violation of Rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-consequences
    + + + + - -
    -

    Risk Matrix 3x3

    +
    +

    Risk Analysis

    - + - + @@ -18826,14 +13116,12 @@

    Risk Matrix 3x3

    - @@ -18847,20 +13135,23 @@

    Risk Matrix 3x3

    - + - + + + + - + @@ -18869,33 +13160,32 @@

    Risk Matrix 3x3

    - +
    TermRiskMatrix3x3RiskAnalysis Prefix risk-owl
    LabelRisk Matrix 3x3Risk Analysis
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
    - https://w3id.org/dpv/risk#RiskMatrix3x3 + https://w3id.org/dpv/risk/owl/#RiskAnalysis
    + https://w3id.org/dpv/risk#RiskAnalysis
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix - → risk-owl:RiskAssessment + risk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-matrixRisk Core
    - -
    -

    Risk Matrix 5x5

    +
    +

    Risk Assessment

    - + - + @@ -18904,15 +13194,12 @@

    Risk Matrix 5x5

    - @@ -18925,55 +13212,54 @@

    Risk Matrix 5x5

    - + - + + + + - + - - - - + - +
    TermRiskMatrix5x5RiskAssessment Prefix risk-owl
    LabelRisk Matrix 5x5Risk Assessment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
    - https://w3id.org/dpv/risk#RiskMatrix5x5 + https://w3id.org/dpv/risk/owl/#RiskAssessment
    + https://w3id.org/dpv/risk#RiskAssessment
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Core
    - -
    -

    Risk Matrix 7x7

    +
    +

    Risk Control

    - + - + - @@ -18982,19 +13268,23 @@

    Risk Matrix 7x7

    - - + + + + @@ -19003,10 +13293,14 @@

    Risk Matrix 7x7

    - + + + + @@ -19016,41 +13310,38 @@

    Risk Matrix 7x7

    - + - - - - + - +
    TermRiskMatrix7x7RiskControl Prefix risk-owl
    LabelRisk Matrix 7x7Risk Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
    - https://w3id.org/dpv/risk#RiskMatrix7x7 +
    + https://w3id.org/dpv/risk/owl/#RiskControl
    + https://w3id.org/dpv/risk#RiskControl
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesControl that modifies risk
    Examples Using risk controls to express how tech/org measures address the risk (E0071) +
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixDex Risk-controls
    -
    -

    Risk Source

    +
    +

    Risk Management

    - + - + @@ -19065,11 +13356,7 @@

    Risk Source

    - - - - + @@ -19078,20 +13365,23 @@

    Risk Source

    - + - + + + + - + @@ -19105,25 +13395,25 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Risk Matrix

    TermRiskSourceRiskManagement Prefix risk-owl
    LabelRisk SourceRisk Management
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskSource
    - https://w3id.org/dpv/risk#RiskSource + https://w3id.org/dpv/risk/owl/#RiskManagement
    + https://w3id.org/dpv/risk#RiskManagement
    in Range of risk-owl:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-02-142024-06-12
    - + - + @@ -19132,15 +13422,13 @@

    Low Risk (RM3x3 S:1 L:1)

    - @@ -19154,20 +13442,23 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + - + @@ -19176,7 +13467,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - +
    TermRM3x3S1L1RiskMatrix Prefix risk-owl
    LabelLow Risk (RM3x3 S:1 L:1)Risk Matrix
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L1
    - https://w3id.org/dpv/risk#RM3x3S1L1 + https://w3id.org/dpv/risk/owl/#RiskMatrix
    + https://w3id.org/dpv/risk#RiskMatrix
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:RiskAssessment
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment + risk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-matrixRisk Core
    @@ -19184,25 +13475,25 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Risk Matrix 3x3

    - + - + @@ -19217,8 +13508,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - @@ -19233,7 +13523,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - + @@ -19263,25 +13553,25 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Risk Matrix 5x5

    TermRM3x3S1L2RiskMatrix3x3 Prefix risk-owl
    LabelLow Risk (RM3x3 S:1 L:2)Risk Matrix 3x3
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L2
    - https://w3id.org/dpv/risk#RM3x3S1L2 + https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
    + https://w3id.org/dpv/risk#RiskMatrix3x3
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix + risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    - + - + @@ -19296,8 +13586,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - @@ -19312,7 +13601,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + @@ -19342,25 +13631,25 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Risk Matrix 7x7

    TermRM3x3S1L3RiskMatrix5x5 Prefix risk-owl
    LabelModerate Risk (RM3x3 S:1 L:3)Risk Matrix 5x5
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L3
    - https://w3id.org/dpv/risk#RM3x3S1L3 + https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
    + https://w3id.org/dpv/risk#RiskMatrix5x5
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix + risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    - + - + @@ -19375,8 +13664,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - @@ -19391,7 +13679,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - + @@ -19420,26 +13708,25 @@

    Low Risk (RM3x3 S:2 L:1)

    - -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Risk Source

    TermRM3x3S2L1RiskMatrix7x7 Prefix risk-owl
    LabelLow Risk (RM3x3 S:2 L:1)Risk Matrix 7x7
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L1
    - https://w3id.org/dpv/risk#RM3x3S2L1 + https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
    + https://w3id.org/dpv/risk#RiskMatrix7x7
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix + risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    - + - + @@ -19448,20 +13735,20 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + + + + @@ -19470,7 +13757,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + @@ -19483,16 +13770,16 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + - - - + + + - +
    TermRM3x3S2L2RiskSource Prefix risk-owl
    LabelModerate Risk (RM3x3 S:2 L:2)Risk Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L2
    - https://w3id.org/dpv/risk#RM3x3S2L2 + https://w3id.org/dpv/risk/owl/#RiskSource
    + https://w3id.org/dpv/risk#RiskSource
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + dpv-owl:RiskConcept
    in Range of risk-owl:hasRiskSource +
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. PanditDate Modified2024-08-16
    Documented inRisk Risk-matrixRisk Core
    @@ -19500,25 +13787,25 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + @@ -19549,7 +13836,7 @@

    High Risk (RM3x3 S:2 L:3)

    - + @@ -19579,25 +13866,25 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRM3x3S2L3RM3x3S1L1 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:2 L:3)Low Risk (RM3x3 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L3
    - https://w3id.org/dpv/risk#RM3x3S2L3 + https://w3id.org/dpv/risk/owl/#RM3x3S1L1
    + https://w3id.org/dpv/risk#RM3x3S1L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -19628,7 +13915,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - + @@ -19658,25 +13945,25 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRM3x3S3L1RM3x3S1L2 Prefix risk-owl
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM3x3 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L1
    - https://w3id.org/dpv/risk#RM3x3S3L1 + https://w3id.org/dpv/risk/owl/#RM3x3S1L2
    + https://w3id.org/dpv/risk#RM3x3S1L2
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    - + - + @@ -19707,7 +13994,7 @@

    High Risk (RM3x3 S:3 L:2)

    - + @@ -19737,25 +14024,25 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRM3x3S3L2RM3x3S1L3 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM3x3 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L2
    - https://w3id.org/dpv/risk#RM3x3S3L2 + https://w3id.org/dpv/risk/owl/#RM3x3S1L3
    + https://w3id.org/dpv/risk#RM3x3S1L3
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + @@ -19786,7 +14073,7 @@

    High Risk (RM3x3 S:3 L:3)

    - + @@ -19816,25 +14103,25 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRM3x3S3L3RM3x3S2L1 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM3x3 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L3
    - https://w3id.org/dpv/risk#RM3x3S3L3 + https://w3id.org/dpv/risk/owl/#RM3x3S2L1
    + https://w3id.org/dpv/risk#RM3x3S2L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    - + - + @@ -19849,7 +14136,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - - + @@ -19895,25 +14182,25 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRM5x5S1L1RM3x3S2L2 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:1)Moderate Risk (RM3x3 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L1
    - https://w3id.org/dpv/risk#RM5x5S1L1 + https://w3id.org/dpv/risk/owl/#RM3x3S2L2
    + https://w3id.org/dpv/risk#RM3x3S2L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -19865,7 +14152,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - @@ -19928,7 +14215,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - - + @@ -19974,25 +14261,25 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRM5x5S1L2RM3x3S2L3 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM3x3 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L2
    - https://w3id.org/dpv/risk#RM5x5S1L2 +
    + https://w3id.org/dpv/risk/owl/#RM3x3S2L3
    + https://w3id.org/dpv/risk#RM3x3S2L3
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -19944,7 +14231,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -20007,7 +14294,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - - + @@ -20053,25 +14340,25 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRM5x5S1L3RM3x3S3L1 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM3x3 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L3
    - https://w3id.org/dpv/risk#RM5x5S1L3 + https://w3id.org/dpv/risk/owl/#RM3x3S3L1
    + https://w3id.org/dpv/risk#RM3x3S3L1
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -20023,7 +14310,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -20086,7 +14373,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - - + @@ -20132,25 +14419,25 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRM5x5S1L4RM3x3S3L2 Prefix risk-owl
    LabelLow Risk (RM5x5 S:1 L:4)High Risk (RM3x3 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L4
    - https://w3id.org/dpv/risk#RM5x5S1L4 + https://w3id.org/dpv/risk/owl/#RM3x3S3L2
    + https://w3id.org/dpv/risk#RM3x3S3L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -20102,7 +14389,7 @@

    Low Risk (RM5x5 S:1 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -20165,7 +14452,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - - + @@ -20211,25 +14498,25 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRM5x5S1L5RM3x3S3L3 Prefix risk-owl
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM3x3 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L5
    - https://w3id.org/dpv/risk#RM5x5S1L5 + https://w3id.org/dpv/risk/owl/#RM3x3S3L3
    + https://w3id.org/dpv/risk#RM3x3S3L3
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -20181,7 +14468,7 @@

    Low Risk (RM5x5 S:1 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + @@ -20260,7 +14547,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -20290,25 +14577,25 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM5x5S2L1RM5x5S1L1 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L1
    - https://w3id.org/dpv/risk#RM5x5S2L1 + https://w3id.org/dpv/risk/owl/#RM5x5S1L1
    + https://w3id.org/dpv/risk#RM5x5S1L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -20339,7 +14626,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -20369,25 +14656,25 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM5x5S2L2RM5x5S1L2 Prefix risk-owl
    LabelLow Risk (RM5x5 S:2 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L2
    - https://w3id.org/dpv/risk#RM5x5S2L2 + https://w3id.org/dpv/risk/owl/#RM5x5S1L2
    + https://w3id.org/dpv/risk#RM5x5S1L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + @@ -20418,7 +14705,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -20448,25 +14735,25 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM5x5S2L3RM5x5S1L3 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:2 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L3
    - https://w3id.org/dpv/risk#RM5x5S2L3 + https://w3id.org/dpv/risk/owl/#RM5x5S1L3
    + https://w3id.org/dpv/risk#RM5x5S1L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + @@ -20497,7 +14784,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -20527,25 +14814,25 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM5x5S2L4RM5x5S1L4 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:2 L:4)Low Risk (RM5x5 S:1 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L4
    - https://w3id.org/dpv/risk#RM5x5S2L4 + https://w3id.org/dpv/risk/owl/#RM5x5S1L4
    + https://w3id.org/dpv/risk#RM5x5S1L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + @@ -20576,7 +14863,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -20606,25 +14893,25 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM5x5S2L5RM5x5S1L5 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:2 L:5)Low Risk (RM5x5 S:1 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L5
    - https://w3id.org/dpv/risk#RM5x5S2L5 + https://w3id.org/dpv/risk/owl/#RM5x5S1L5
    + https://w3id.org/dpv/risk#RM5x5S1L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + @@ -20655,7 +14942,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -20685,25 +14972,25 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM5x5S3L1RM5x5S2L1 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM5x5 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L1
    - https://w3id.org/dpv/risk#RM5x5S3L1 + https://w3id.org/dpv/risk/owl/#RM5x5S2L1
    + https://w3id.org/dpv/risk#RM5x5S2L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -20734,7 +15021,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -20764,25 +15051,25 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM5x5S3L2RM5x5S2L2 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L2
    - https://w3id.org/dpv/risk#RM5x5S3L2 + https://w3id.org/dpv/risk/owl/#RM5x5S2L2
    + https://w3id.org/dpv/risk#RM5x5S2L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -20813,7 +15100,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -20843,25 +15130,25 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM5x5S3L3RM5x5S2L3 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:3 L:3)Moderate Risk (RM5x5 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L3
    - https://w3id.org/dpv/risk#RM5x5S3L3 + https://w3id.org/dpv/risk/owl/#RM5x5S2L3
    + https://w3id.org/dpv/risk#RM5x5S2L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -20892,7 +15179,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -20922,25 +15209,25 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM5x5S3L4RM5x5S2L4 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:3 L:4)Moderate Risk (RM5x5 S:2 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L4
    - https://w3id.org/dpv/risk#RM5x5S3L4 + https://w3id.org/dpv/risk/owl/#RM5x5S2L4
    + https://w3id.org/dpv/risk#RM5x5S2L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + @@ -20971,7 +15258,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -21001,25 +15288,25 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S3L5RM5x5S2L5 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:3 L:5)High Risk (RM5x5 S:2 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L5
    - https://w3id.org/dpv/risk#RM5x5S3L5 + https://w3id.org/dpv/risk/owl/#RM5x5S2L5
    + https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + @@ -21050,7 +15337,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -21080,25 +15367,25 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S4L1RM5x5S3L1 Prefix risk-owl
    LabelLow Risk (RM5x5 S:4 L:1)Very Low Risk (RM5x5 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L1
    - https://w3id.org/dpv/risk#RM5x5S4L1 + https://w3id.org/dpv/risk/owl/#RM5x5S3L1
    + https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -21129,7 +15416,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - + @@ -21159,25 +15446,25 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S4L2RM5x5S3L2 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:4 L:2)Moderate Risk (RM5x5 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L2
    - https://w3id.org/dpv/risk#RM5x5S4L2 + https://w3id.org/dpv/risk/owl/#RM5x5S3L2
    + https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -21208,7 +15495,7 @@

    High Risk (RM5x5 S:4 L:3)

    - + @@ -21238,25 +15525,25 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S4L3RM5x5S3L3 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM5x5 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L3
    - https://w3id.org/dpv/risk#RM5x5S4L3 + https://w3id.org/dpv/risk/owl/#RM5x5S3L3
    + https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -21287,7 +15574,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - + @@ -21317,25 +15604,25 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S4L4RM5x5S3L4 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:4 L:4)High Risk (RM5x5 S:3 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L4
    - https://w3id.org/dpv/risk#RM5x5S4L4 + https://w3id.org/dpv/risk/owl/#RM5x5S3L4
    + https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -21366,7 +15653,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - + @@ -21396,25 +15683,25 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S4L5RM5x5S3L5 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:3 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L5
    - https://w3id.org/dpv/risk#RM5x5S4L5 + https://w3id.org/dpv/risk/owl/#RM5x5S3L5
    + https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -21445,7 +15732,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - + @@ -21475,25 +15762,25 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S5L1RM5x5S4L1 Prefix risk-owl
    LabelLow Risk (RM5x5 S:5 L:1)Low Risk (RM5x5 S:4 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L1
    - https://w3id.org/dpv/risk#RM5x5S5L1 + https://w3id.org/dpv/risk/owl/#RM5x5S4L1
    + https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -21524,7 +15811,7 @@

    High Risk (RM5x5 S:5 L:2)

    - + @@ -21554,25 +15841,25 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S5L2RM5x5S4L2 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:5 L:2)Moderate Risk (RM5x5 S:4 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L2
    - https://w3id.org/dpv/risk#RM5x5S5L2 + https://w3id.org/dpv/risk/owl/#RM5x5S4L2
    + https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -21603,7 +15890,7 @@

    High Risk (RM5x5 S:5 L:3)

    - + @@ -21633,25 +15920,25 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S5L3RM5x5S4L3 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:5 L:3)High Risk (RM5x5 S:4 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L3
    - https://w3id.org/dpv/risk#RM5x5S5L3 + https://w3id.org/dpv/risk/owl/#RM5x5S4L3
    + https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -21682,7 +15969,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - + @@ -21712,25 +15999,25 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S5L4RM5x5S4L4 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:5 L:4)Very High Risk (RM5x5 S:4 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L4
    - https://w3id.org/dpv/risk#RM5x5S5L4 + https://w3id.org/dpv/risk/owl/#RM5x5S4L4
    + https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -21761,7 +16048,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - + @@ -21791,25 +16078,25 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S5L5RM5x5S4L5 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:5 L:5)Very High Risk (RM5x5 S:4 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L5
    - https://w3id.org/dpv/risk#RM5x5S5L5 + https://w3id.org/dpv/risk/owl/#RM5x5S4L5
    + https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -21824,7 +16111,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - - + @@ -21870,25 +16157,25 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM7x7S1L1RM5x5S5L1 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L1
    - https://w3id.org/dpv/risk#RM7x7S1L1 + https://w3id.org/dpv/risk/owl/#RM5x5S5L1
    + https://w3id.org/dpv/risk#RM5x5S5L1
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -21840,7 +16127,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -21903,7 +16190,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - - + @@ -21949,25 +16236,25 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM7x7S1L2RM5x5S5L2 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L2
    - https://w3id.org/dpv/risk#RM7x7S1L2 + https://w3id.org/dpv/risk/owl/#RM5x5S5L2
    + https://w3id.org/dpv/risk#RM5x5S5L2
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -21919,7 +16206,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + @@ -21982,7 +16269,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - - + @@ -22028,25 +16315,25 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM7x7S1L3RM5x5S5L3 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L3
    - https://w3id.org/dpv/risk#RM7x7S1L3 + https://w3id.org/dpv/risk/owl/#RM5x5S5L3
    + https://w3id.org/dpv/risk#RM5x5S5L3
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -21998,7 +16285,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -22061,7 +16348,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - - + @@ -22107,25 +16394,25 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM7x7S1L4RM5x5S5L4 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L4
    - https://w3id.org/dpv/risk#RM7x7S1L4 + https://w3id.org/dpv/risk/owl/#RM5x5S5L4
    + https://w3id.org/dpv/risk#RM5x5S5L4
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -22077,7 +16364,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -22140,7 +16427,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - - + @@ -22186,25 +16473,25 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM7x7S1L5RM5x5S5L5 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L5
    - https://w3id.org/dpv/risk#RM7x7S1L5 + https://w3id.org/dpv/risk/owl/#RM5x5S5L5
    + https://w3id.org/dpv/risk#RM5x5S5L5
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -22156,7 +16443,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -22235,7 +16522,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -22265,25 +16552,25 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM7x7S1L6RM7x7S1L1 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:6)Extremely Low Risk (RM7x7 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L6
    - https://w3id.org/dpv/risk#RM7x7S1L6 + https://w3id.org/dpv/risk/owl/#RM7x7S1L1
    + https://w3id.org/dpv/risk#RM7x7S1L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -22314,7 +16601,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -22344,25 +16631,25 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM7x7S1L7RM7x7S1L2 Prefix risk-owl
    LabelLow Risk (RM7x7 S:1 L:7)Extremely Low Risk (RM7x7 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L7
    - https://w3id.org/dpv/risk#RM7x7S1L7 + https://w3id.org/dpv/risk/owl/#RM7x7S1L2
    + https://w3id.org/dpv/risk#RM7x7S1L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + @@ -22393,7 +16680,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -22423,25 +16710,25 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM7x7S2L1RM7x7S1L3 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L1
    - https://w3id.org/dpv/risk#RM7x7S2L1 + https://w3id.org/dpv/risk/owl/#RM7x7S1L3
    + https://w3id.org/dpv/risk#RM7x7S1L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + @@ -22472,7 +16759,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -22502,25 +16789,25 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM7x7S2L2RM7x7S1L4 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:1 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L2
    - https://w3id.org/dpv/risk#RM7x7S2L2 + https://w3id.org/dpv/risk/owl/#RM7x7S1L4
    + https://w3id.org/dpv/risk#RM7x7S1L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + @@ -22551,7 +16838,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -22581,25 +16868,25 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM7x7S2L3RM7x7S1L5 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:2 L:3)Very Low Risk (RM7x7 S:1 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L3
    - https://w3id.org/dpv/risk#RM7x7S2L3 + https://w3id.org/dpv/risk/owl/#RM7x7S1L5
    + https://w3id.org/dpv/risk#RM7x7S1L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + @@ -22630,7 +16917,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -22660,25 +16947,25 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S2L4RM7x7S1L6 Prefix risk-owl
    LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:1 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L4
    - https://w3id.org/dpv/risk#RM7x7S2L4 + https://w3id.org/dpv/risk/owl/#RM7x7S1L6
    + https://w3id.org/dpv/risk#RM7x7S1L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + @@ -22709,7 +16996,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -22739,25 +17026,25 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM7x7S2L5RM7x7S1L7 Prefix risk-owl
    LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:1 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L5
    - https://w3id.org/dpv/risk#RM7x7S2L5 + https://w3id.org/dpv/risk/owl/#RM7x7S1L7
    + https://w3id.org/dpv/risk#RM7x7S1L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + @@ -22788,7 +17075,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -22818,25 +17105,25 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM7x7S2L6RM7x7S2L1 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:2 L:6)Extremely Low Risk (RM7x7 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L6
    - https://w3id.org/dpv/risk#RM7x7S2L6 + https://w3id.org/dpv/risk/owl/#RM7x7S2L1
    + https://w3id.org/dpv/risk#RM7x7S2L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -22867,7 +17154,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -22897,25 +17184,25 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM7x7S2L7RM7x7S2L2 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely Low Risk (RM7x7 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L7
    - https://w3id.org/dpv/risk#RM7x7S2L7 + https://w3id.org/dpv/risk/owl/#RM7x7S2L2
    + https://w3id.org/dpv/risk#RM7x7S2L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + @@ -22946,7 +17233,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -22976,25 +17263,25 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM7x7S3L1RM7x7S2L3 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Very Low Risk (RM7x7 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L1
    - https://w3id.org/dpv/risk#RM7x7S3L1 + https://w3id.org/dpv/risk/owl/#RM7x7S2L3
    + https://w3id.org/dpv/risk#RM7x7S2L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + @@ -23025,7 +17312,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -23055,25 +17342,25 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S3L2RM7x7S2L4 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:3 L:2)Low Risk (RM7x7 S:2 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L2
    - https://w3id.org/dpv/risk#RM7x7S3L2 + https://w3id.org/dpv/risk/owl/#RM7x7S2L4
    + https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + @@ -23104,7 +17391,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -23134,25 +17421,25 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S3L3RM7x7S2L5 Prefix risk-owl
    LabelLow Risk (RM7x7 S:3 L:3)Low Risk (RM7x7 S:2 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L3
    - https://w3id.org/dpv/risk#RM7x7S3L3 + https://w3id.org/dpv/risk/owl/#RM7x7S2L5
    + https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + @@ -23183,7 +17470,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -23213,25 +17500,25 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S3L4RM7x7S2L6 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:3 L:4)Moderate Risk (RM7x7 S:2 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L4
    - https://w3id.org/dpv/risk#RM7x7S3L4 + https://w3id.org/dpv/risk/owl/#RM7x7S2L6
    + https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + @@ -23262,7 +17549,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -23292,25 +17579,25 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S3L5RM7x7S2L7 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:2 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L5
    - https://w3id.org/dpv/risk#RM7x7S3L5 + https://w3id.org/dpv/risk/owl/#RM7x7S2L7
    + https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + @@ -23341,7 +17628,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -23371,25 +17658,25 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S3L6RM7x7S3L1 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:3 L:6)Extremely Low Risk (RM7x7 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L6
    - https://w3id.org/dpv/risk#RM7x7S3L6 + https://w3id.org/dpv/risk/owl/#RM7x7S3L1
    + https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -23420,7 +17707,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -23450,25 +17737,25 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S3L7RM7x7S3L2 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:3 L:7)Very Low Risk (RM7x7 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L7
    - https://w3id.org/dpv/risk#RM7x7S3L7 + https://w3id.org/dpv/risk/owl/#RM7x7S3L2
    + https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -23499,7 +17786,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -23529,25 +17816,25 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S4L1RM7x7S3L3 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Low Risk (RM7x7 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L1
    - https://w3id.org/dpv/risk#RM7x7S4L1 + https://w3id.org/dpv/risk/owl/#RM7x7S3L3
    + https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -23578,7 +17865,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -23608,25 +17895,25 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S4L2RM7x7S3L4 Prefix risk-owl
    LabelLow Risk (RM7x7 S:4 L:2)Moderate Risk (RM7x7 S:3 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L2
    - https://w3id.org/dpv/risk#RM7x7S4L2 + https://w3id.org/dpv/risk/owl/#RM7x7S3L4
    + https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -23657,7 +17944,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -23687,25 +17974,25 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S4L3RM7x7S3L5 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:4 L:3)High Risk (RM7x7 S:3 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L3
    - https://w3id.org/dpv/risk#RM7x7S4L3 + https://w3id.org/dpv/risk/owl/#RM7x7S3L5
    + https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + @@ -23736,7 +18023,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -23766,25 +18053,25 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S4L4RM7x7S3L6 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:3 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L4
    - https://w3id.org/dpv/risk#RM7x7S4L4 + https://w3id.org/dpv/risk/owl/#RM7x7S3L6
    + https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + @@ -23815,7 +18102,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -23845,25 +18132,25 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S4L5RM7x7S3L7 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:3 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L5
    - https://w3id.org/dpv/risk#RM7x7S4L5 + https://w3id.org/dpv/risk/owl/#RM7x7S3L7
    + https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + @@ -23894,7 +18181,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -23924,25 +18211,25 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S4L6RM7x7S4L1 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely Low Risk (RM7x7 S:4 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L6
    - https://w3id.org/dpv/risk#RM7x7S4L6 + https://w3id.org/dpv/risk/owl/#RM7x7S4L1
    + https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -23973,7 +18260,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -24003,25 +18290,25 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S4L7RM7x7S4L2 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:4 L:7)Low Risk (RM7x7 S:4 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L7
    - https://w3id.org/dpv/risk#RM7x7S4L7 + https://w3id.org/dpv/risk/owl/#RM7x7S4L2
    + https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -24052,7 +18339,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -24082,25 +18369,25 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S5L1RM7x7S4L3 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:5 L:1)Moderate Risk (RM7x7 S:4 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L1
    - https://w3id.org/dpv/risk#RM7x7S5L1 + https://w3id.org/dpv/risk/owl/#RM7x7S4L3
    + https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -24131,7 +18418,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -24160,26 +18447,26 @@

    Low Risk (RM7x7 S:5 L:2)

    - -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    + +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S5L2RM7x7S4L4 Prefix risk-owl
    LabelLow Risk (RM7x7 S:5 L:2)High Risk (RM7x7 S:4 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L2
    - https://w3id.org/dpv/risk#RM7x7S5L2 + https://w3id.org/dpv/risk/owl/#RM7x7S4L4
    + https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -24210,7 +18497,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -24240,25 +18527,25 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S5L3RM7x7S4L5 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:5 L:3)High Risk (RM7x7 S:4 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L3
    - https://w3id.org/dpv/risk#RM7x7S5L3 + https://w3id.org/dpv/risk/owl/#RM7x7S4L5
    + https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -24289,7 +18576,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -24319,25 +18606,25 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S5L4RM7x7S4L6 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:5 L:4)Very High Risk (RM7x7 S:4 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L4
    - https://w3id.org/dpv/risk#RM7x7S5L4 + https://w3id.org/dpv/risk/owl/#RM7x7S4L6
    + https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -24368,7 +18655,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -24398,25 +18685,25 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S5L5RM7x7S4L7 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:5 L:5)Very High Risk (RM7x7 S:4 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L5
    - https://w3id.org/dpv/risk#RM7x7S5L5 + https://w3id.org/dpv/risk/owl/#RM7x7S4L7
    + https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + @@ -24447,7 +18734,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -24477,25 +18764,25 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S5L6RM7x7S5L1 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:5 L:6)Very Low Risk (RM7x7 S:5 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L6
    - https://w3id.org/dpv/risk#RM7x7S5L6 + https://w3id.org/dpv/risk/owl/#RM7x7S5L1
    + https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + @@ -24526,7 +18813,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -24556,25 +18843,25 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S5L7RM7x7S5L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:5 L:7)Low Risk (RM7x7 S:5 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L7
    - https://w3id.org/dpv/risk#RM7x7S5L7 + https://w3id.org/dpv/risk/owl/#RM7x7S5L2
    + https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -24605,7 +18892,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -24635,25 +18922,25 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S6L1RM7x7S5L3 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:6 L:1)Moderate Risk (RM7x7 S:5 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L1
    - https://w3id.org/dpv/risk#RM7x7S6L1 + https://w3id.org/dpv/risk/owl/#RM7x7S5L3
    + https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -24684,7 +18971,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -24714,25 +19001,25 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S6L2RM7x7S5L4 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:6 L:2)High Risk (RM7x7 S:5 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L2
    - https://w3id.org/dpv/risk#RM7x7S6L2 + https://w3id.org/dpv/risk/owl/#RM7x7S5L4
    + https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -24763,7 +19050,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -24793,25 +19080,25 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S6L3RM7x7S5L5 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:6 L:3)Very High Risk (RM7x7 S:5 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L3
    - https://w3id.org/dpv/risk#RM7x7S6L3 + https://w3id.org/dpv/risk/owl/#RM7x7S5L5
    + https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -24842,7 +19129,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -24872,25 +19159,25 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S6L4RM7x7S5L6 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:5 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L4
    - https://w3id.org/dpv/risk#RM7x7S6L4 + https://w3id.org/dpv/risk/owl/#RM7x7S5L6
    + https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + @@ -24921,7 +19208,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -24951,25 +19238,25 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S6L5RM7x7S5L7 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:6 L:5)Extremely High Risk (RM7x7 S:5 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L5
    - https://w3id.org/dpv/risk#RM7x7S6L5 + https://w3id.org/dpv/risk/owl/#RM7x7S5L7
    + https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + @@ -25000,7 +19287,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + @@ -25030,25 +19317,25 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S6L6RM7x7S6L1 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:6 L:6)Very Low Risk (RM7x7 S:6 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L6
    - https://w3id.org/dpv/risk#RM7x7S6L6 + https://w3id.org/dpv/risk/owl/#RM7x7S6L1
    + https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + @@ -25079,7 +19366,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -25109,25 +19396,25 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S6L7RM7x7S6L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:6 L:7)Moderate Risk (RM7x7 S:6 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L7
    - https://w3id.org/dpv/risk#RM7x7S6L7 + https://w3id.org/dpv/risk/owl/#RM7x7S6L2
    + https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + @@ -25158,7 +19445,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - + @@ -25188,25 +19475,25 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S7L1RM7x7S6L3 Prefix risk-owl
    LabelLow Risk (RM7x7 S:7 L:1)High Risk (RM7x7 S:6 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L1
    - https://w3id.org/dpv/risk#RM7x7S7L1 + https://w3id.org/dpv/risk/owl/#RM7x7S6L3
    + https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + @@ -25237,7 +19524,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -25267,25 +19554,25 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S7L2RM7x7S6L4 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:7 L:2)Very High Risk (RM7x7 S:6 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L2
    - https://w3id.org/dpv/risk#RM7x7S7L2 + https://w3id.org/dpv/risk/owl/#RM7x7S6L4
    + https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + @@ -25316,7 +19603,7 @@

    High Risk (RM7x7 S:7 L:3)

    - + @@ -25346,25 +19633,25 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S7L3RM7x7S6L5 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:7 L:3)Very High Risk (RM7x7 S:6 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L3
    - https://w3id.org/dpv/risk#RM7x7S7L3 + https://w3id.org/dpv/risk/owl/#RM7x7S6L5
    + https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -25395,7 +19682,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + @@ -25425,25 +19712,25 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S7L4RM7x7S6L6 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:7 L:4)Extremely High Risk (RM7x7 S:6 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L4
    - https://w3id.org/dpv/risk#RM7x7S7L4 + https://w3id.org/dpv/risk/owl/#RM7x7S6L6
    + https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + @@ -25474,7 +19761,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -25504,25 +19791,25 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S7L5RM7x7S6L7 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:5)Extremely High Risk (RM7x7 S:6 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L5
    - https://w3id.org/dpv/risk#RM7x7S7L5 + https://w3id.org/dpv/risk/owl/#RM7x7S6L7
    + https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + @@ -25553,7 +19840,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -25583,25 +19870,25 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S7L6RM7x7S7L1 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:6)Low Risk (RM7x7 S:7 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L6
    - https://w3id.org/dpv/risk#RM7x7S7L6 + https://w3id.org/dpv/risk/owl/#RM7x7S7L1
    + https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + @@ -25632,7 +19919,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -25662,25 +19949,25 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Sabotage

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S7L7RM7x7S7L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:7)Moderate Risk (RM7x7 S:7 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L7
    - https://w3id.org/dpv/risk#RM7x7S7L7 + https://w3id.org/dpv/risk/owl/#RM7x7S7L2
    + https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + @@ -25689,33 +19976,20 @@

    Sabotage

    - - - - - - - - - + + @@ -25724,17 +19998,14 @@

    Sabotage

    - + - - - - + @@ -25749,7 +20020,7 @@

    Sabotage

    - +
    TermSabotageRM7x7S7L3 Prefix risk-owl
    LabelSabotageHigh Risk (RM7x7 S:7 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Sabotage
    - https://w3id.org/dpv/risk#Sabotage + https://w3id.org/dpv/risk/owl/#RM7x7S7L3
    + https://w3id.org/dpv/risk#RM7x7S7L3
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSabotageNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    SourceENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -25757,25 +20028,25 @@

    Sabotage

    -
    -

    Scam

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    - + - + @@ -25784,33 +20055,20 @@

    Scam

    - - - - - - - - - + + @@ -25819,17 +20077,14 @@

    Scam

    - + - - - - + @@ -25844,7 +20099,7 @@

    Scam

    - +
    TermScamRM7x7S7L4 Prefix risk-owl
    LabelScamVery High Risk (RM7x7 S:7 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Scam
    - https://w3id.org/dpv/risk#Scam + https://w3id.org/dpv/risk/owl/#RM7x7S7L4
    + https://w3id.org/dpv/risk#RM7x7S7L4
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionScamNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    SourceISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -25852,25 +20107,25 @@

    Scam

    -
    -

    Security Breach

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - + @@ -25879,31 +20134,20 @@

    Security Breach

    - - - - - - - - - + + @@ -25912,17 +20156,14 @@

    Security Breach

    - + - - - - + @@ -25937,7 +20178,7 @@

    Security Breach

    - +
    TermSecurityBreachRM7x7S7L5 Prefix risk-owl
    LabelSecurity BreachExtremely High Risk (RM7x7 S:7 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SecurityBreach
    - https://w3id.org/dpv/risk#SecurityBreach + https://w3id.org/dpv/risk/owl/#RM7x7S7L5
    + https://w3id.org/dpv/risk#RM7x7S7L5
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskAnalysis
    Sub-class of dpv-owl:Risk + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSecurity BreachNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -25945,30 +20186,25 @@

    Security Breach

    - - - - - -
    -

    Service Interruption

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - + @@ -25977,32 +20213,20 @@

    Service Interruption

    - - - - - - - - - + + @@ -26011,17 +20235,14 @@

    Service Interruption

    - + - - - - + @@ -26036,7 +20257,7 @@

    Service Interruption

    - +
    TermServiceInterruptionRM7x7S7L6 Prefix risk-owl
    LabelService InterruptionExtremely High Risk (RM7x7 S:7 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ServiceInterruption
    - https://w3id.org/dpv/risk#ServiceInterruption + https://w3id.org/dpv/risk/owl/#RM7x7S7L6
    + https://w3id.org/dpv/risk#RM7x7S7L6
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionService InterruptionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -26044,25 +20265,25 @@

    Service Interruption

    -
    -

    Sexual Violence

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - + @@ -26071,33 +20292,20 @@

    Sexual Violence

    - - - - - - - - - + + @@ -26106,17 +20314,14 @@

    Sexual Violence

    - + - - - - + @@ -26131,7 +20336,7 @@

    Sexual Violence

    - +
    TermSexualViolenceRM7x7S7L7 Prefix risk-owl
    LabelSexual ViolenceExtremely High Risk (RM7x7 S:7 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SexualViolence
    - https://w3id.org/dpv/risk#SexualViolence + https://w3id.org/dpv/risk/owl/#RM7x7S7L7
    + https://w3id.org/dpv/risk#RM7x7S7L7
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSexual ViolenceNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    SourceENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -26139,25 +20344,25 @@

    Sexual Violence

    -
    -

    Share Risk

    +
    +

    Sabotage

    - + - + @@ -26166,25 +20371,18 @@

    Share Risk

    - - - - - + @@ -26193,29 +20391,35 @@

    Share Risk

    - + - + + + + - + - + + + + - +
    TermShareRiskSabotage Prefix risk-owl
    LabelShare RiskSabotage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ShareRisk
    - https://w3id.org/dpv/risk#ShareRisk + https://w3id.org/dpv/risk/owl/#Sabotage
    + https://w3id.org/dpv/risk#Sabotage
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -26223,25 +20427,25 @@

    Share Risk

    -
    -

    Social Disadvantage

    +
    +

    Scam

    - + - + @@ -26250,31 +20454,18 @@

    Social Disadvantage

    - - - - - - - - - + + @@ -26283,25 +20474,31 @@

    Social Disadvantage

    - + - + + + + - + - + + + + - + @@ -26313,25 +20510,25 @@

    Social Disadvantage

    -
    -

    Source Control

    +
    +

    Security Attack

    TermSocialDisadvantageScam Prefix risk-owl
    LabelSocial DisadvantageScam
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SocialDisadvantage
    - https://w3id.org/dpv/risk#SocialDisadvantage + https://w3id.org/dpv/risk/owl/#Scam
    + https://w3id.org/dpv/risk#Scam
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSocial DisadvantageSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    Documented in
    - + - + @@ -26340,25 +20537,18 @@

    Source Control

    - - - - - + @@ -26367,7 +20557,7 @@

    Source Control

    - + @@ -26378,18 +20568,12 @@

    Source Control

    - - - - + + - - - - - +
    TermSourceControlSecurityAttack Prefix risk-owl
    LabelSource ControlSecurity Attack
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SourceControl
    - https://w3id.org/dpv/risk#SourceControl + https://w3id.org/dpv/risk/owl/#SecurityAttack
    + https://w3id.org/dpv/risk#SecurityAttack
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-consequences
    @@ -26397,25 +20581,25 @@

    Source Control

    -
    -

    Spam

    +
    +

    Security Breach

    - + - + @@ -26424,33 +20608,18 @@

    Spam

    - - - - - - - - - + + @@ -26459,7 +20628,7 @@

    Spam

    - + @@ -26468,7 +20637,7 @@

    Spam

    - + @@ -26477,7 +20646,10 @@

    Spam

    - + + + + @@ -26492,25 +20664,30 @@

    Spam

    -
    -

    Spoofing

    + + + + + +
    +

    Sexual Violence

    TermSpamSecurityBreach Prefix risk-owl
    LabelSpamSecurity Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Spam
    - https://w3id.org/dpv/risk#Spam + https://w3id.org/dpv/risk/owl/#SecurityBreach
    + https://w3id.org/dpv/risk#SecurityBreach
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSpamSomething that acts as or causes Security Breach
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -26519,33 +20696,17 @@

    Spoofing

    - - - - - - - - - + + @@ -26554,7 +20715,7 @@

    Spoofing

    - + @@ -26563,7 +20724,7 @@

    Spoofing

    - + @@ -26572,7 +20733,10 @@

    Spoofing

    - + + + + @@ -26587,25 +20751,25 @@

    Spoofing

    -
    -

    Spying

    +
    +

    Share Risk

    TermSpoofingSexualViolence Prefix risk-owl
    LabelSpoofingSexual Violence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Spoofing
    - https://w3id.org/dpv/risk#Spoofing + https://w3id.org/dpv/risk/owl/#SexualViolence
    + https://w3id.org/dpv/risk#SexualViolence
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:IndividualRisk
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSpoofingSomething that acts as or causes Sexual Violence
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -26614,31 +20778,23 @@

    Spying

    - - - - - + - @@ -26649,23 +20805,20 @@

    Spying

    - + - - - - + - + @@ -26674,7 +20827,7 @@

    Spying

    - +
    TermSpyingShareRisk Prefix risk-owl
    LabelSpyingShare Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Spying
    - https://w3id.org/dpv/risk#Spying + https://w3id.org/dpv/risk/owl/#ShareRisk
    + https://w3id.org/dpv/risk#ShareRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionSpyingRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -26682,25 +20835,25 @@

    Spying

    -
    -

    Stalking

    +
    +

    Social Disadvantage

    - + - + @@ -26709,33 +20862,18 @@

    Stalking

    - - - - - - - - - + + @@ -26744,28 +20882,28 @@

    Stalking

    - + - - - - + - + - + + + + - + @@ -26777,25 +20915,25 @@

    Stalking

    -
    -

    System Failure

    +
    +

    Societal Health & Safety

    TermStalkingSocialDisadvantage Prefix risk-owl
    LabelStalkingSocial Disadvantage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Stalking
    - https://w3id.org/dpv/risk#Stalking + https://w3id.org/dpv/risk/owl/#SocialDisadvantage
    + https://w3id.org/dpv/risk#SocialDisadvantage
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionStalkingSomething that acts as or causes Social Disadvantage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    Documented in
    - + - + @@ -26804,63 +20942,37 @@

    System Failure

    - - - - - - - - - + + - - - - + - - - - + - - - - + + - - - - @@ -26871,25 +20983,25 @@

    System Failure

    -
    -

    System Intrusion

    +
    +

    Societal Risk

    TermSystemFailureSocietalHealthSafety Prefix risk-owl
    LabelSystem FailureSocietal Health & Safety
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemFailure
    - https://w3id.org/dpv/risk#SystemFailure + https://w3id.org/dpv/risk/owl/#SocietalHealthSafety
    + https://w3id.org/dpv/risk#SocietalHealthSafety
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSystem Failure
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -26898,32 +21010,17 @@

    System Intrusion

    - - - - - - - - - + + @@ -26932,29 +21029,20 @@

    System Intrusion

    - + - - - - + - - - - + + - - - - @@ -26965,25 +21053,25 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Source Control

    TermSystemIntrusionSocietalRisk Prefix risk-owl
    LabelSystem IntrusionSocietal Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemIntrusion
    - https://w3id.org/dpv/risk#SystemIntrusion + https://w3id.org/dpv/risk/owl/#SocietalRisk
    + https://w3id.org/dpv/risk#SocietalRisk
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionSystem IntrusionRisks and issues that affect or have the potential to affect society at large or specific groups in society
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -26992,30 +21080,23 @@

    System Malfunction

    - - - - - + - @@ -27026,23 +21107,20 @@

    System Malfunction

    - + - - - - + - + @@ -27051,7 +21129,7 @@

    System Malfunction

    - +
    TermSystemMalfunctionSourceControl Prefix risk-owl
    LabelSystem MalfunctionSource Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemMalfunction
    - https://w3id.org/dpv/risk#SystemMalfunction + https://w3id.org/dpv/risk/owl/#SourceControl
    + https://w3id.org/dpv/risk#SourceControl
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , risk-owl:RiskControl
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionSystem MalfunctionRisk Mitigation Measure that controls the Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -27059,25 +21137,25 @@

    System Malfunction

    -
    -

    Terrorism

    +
    +

    Spoofing

    - + - + @@ -27086,33 +21164,22 @@

    Terrorism

    - + + - - - - - - - - + + @@ -27121,7 +21188,7 @@

    Terrorism

    - + @@ -27130,7 +21197,7 @@

    Terrorism

    - + @@ -27139,7 +21206,10 @@

    Terrorism

    - + + + + @@ -27154,25 +21224,25 @@

    Terrorism

    -
    -

    Theft

    +
    +

    System Failure

    TermTerrorismSpoofing Prefix risk-owl
    LabelTerrorismSpoofing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Terrorism
    - https://w3id.org/dpv/risk#Terrorism + https://w3id.org/dpv/risk/owl/#Spoofing
    + https://w3id.org/dpv/risk#Spoofing
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
    Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionTerrorismSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018ISO/IEC 27005:2018,ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -27181,33 +21251,18 @@

    Theft

    - - - - - - - - - + + @@ -27216,16 +21271,19 @@

    Theft

    - + - + + + + - + @@ -27234,7 +21292,10 @@

    Theft

    - + + + + @@ -27249,25 +21310,25 @@

    Theft

    -
    -

    Theft of Equipment

    +
    +

    System Intrusion

    TermTheftSystemFailure Prefix risk-owl
    LabelTheftSystem Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Theft
    - https://w3id.org/dpv/risk#Theft + https://w3id.org/dpv/risk/owl/#SystemFailure
    + https://w3id.org/dpv/risk#SystemFailure
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionTheftSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -27276,33 +21337,18 @@

    Theft of Equipment

    - - - - - - - - - + + @@ -27311,7 +21357,7 @@

    Theft of Equipment

    - + @@ -27320,7 +21366,7 @@

    Theft of Equipment

    - + @@ -27329,7 +21375,10 @@

    Theft of Equipment

    - + + + + @@ -27344,25 +21393,25 @@

    Theft of Equipment

    -
    -

    Theft of Media

    +
    +

    System Malfunction

    TermTheftEquipmentSystemIntrusion Prefix risk-owl
    LabelTheft of EquipmentSystem Intrusion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#TheftEquipment
    - https://w3id.org/dpv/risk#TheftEquipment + https://w3id.org/dpv/risk/owl/#SystemIntrusion
    + https://w3id.org/dpv/risk#SystemIntrusion
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionTheft of EquipmentSomething that acts as or causes System Intrusion
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -27371,33 +21420,18 @@

    Theft of Media

    - - - - - - - - - + + @@ -27406,9 +21440,12 @@

    Theft of Media

    - + - + + + + @@ -27424,7 +21461,10 @@

    Theft of Media

    - + + + + @@ -27439,25 +21479,25 @@

    Theft of Media

    -
    -

    Third Party Operation Disruption

    +
    +

    Terrorism

    TermTheftMediaSystemMalfunction Prefix risk-owl
    LabelTheft of MediaSystem Malfunction
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#TheftMedia
    - https://w3id.org/dpv/risk#TheftMedia + https://w3id.org/dpv/risk/owl/#SystemMalfunction
    + https://w3id.org/dpv/risk#SystemMalfunction
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:MaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionTheft of MediaSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -27466,32 +21506,18 @@

    Third Party Operation Disruption

    - - - - - - - - - + + @@ -27500,7 +21526,7 @@

    Third Party Operation Disruption

    - + @@ -27518,7 +21544,10 @@

    Third Party Operation Disruption

    - + + + + @@ -27565,6 +21594,7 @@

    Threat

    @@ -27714,32 +21744,18 @@

    Unauthorised Access to Premises

    - - - - - - - - - + + @@ -27748,7 +21764,7 @@

    Unauthorised Access to Premises

    - + @@ -27766,7 +21782,10 @@

    Unauthorised Access to Premises

    - + + + + @@ -27781,25 +21800,25 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Code Access

    +
    +

    Unauthorised Activity

    TermThirdPartyOperationDisruptionTerrorism Prefix risk-owl
    LabelThird Party Operation DisruptionTerrorism
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ThirdPartyOperationDisruption
    - https://w3id.org/dpv/risk#ThirdPartyOperationDisruption + https://w3id.org/dpv/risk/owl/#Terrorism
    + https://w3id.org/dpv/risk#Terrorism
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionThird Party Operation DisruptionSomething that acts as or causes Terrorism
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Sub-class of risk-owl:RiskSource + → dpv-owl:RiskConcept
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Access to PremisesSomething that acts as or causes Unauthorised Access to Premises
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -27808,32 +21827,18 @@

    Unauthorised Code Access

    - - - - - - - - - + + @@ -27842,29 +21847,20 @@

    Unauthorised Code Access

    - + - - - - + - - - - + + - - - - @@ -27875,25 +21871,25 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Unauthorised Code Access

    TermUnauthorisedCodeAccessUnauthorisedActivity Prefix risk-owl
    LabelUnauthorised Code AccessUnauthorised Activity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedCodeAccess
    - https://w3id.org/dpv/risk#UnauthorisedCodeAccess + https://w3id.org/dpv/risk/owl/#UnauthorisedActivity
    + https://w3id.org/dpv/risk#UnauthorisedActivity
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Code AccessSomething that acts as or causes Unauthorised Activity
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -27902,32 +21898,18 @@

    Unauthorised Code Disclosure

    - - - - - - - - - + + @@ -27936,7 +21918,7 @@

    Unauthorised Code Disclosure

    - + @@ -27954,7 +21936,10 @@

    Unauthorised Code Disclosure

    - + + + + @@ -27969,25 +21954,25 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Unauthorised Code Disclosure

    TermUnauthorisedCodeDisclosureUnauthorisedCodeAccess Prefix risk-owl
    LabelUnauthorised Code DisclosureUnauthorised Code Access
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedCodeDisclosure
    - https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure + https://w3id.org/dpv/risk/owl/#UnauthorisedCodeAccess
    + https://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Code DisclosureSomething that acts as or causes Unauthorised Code Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -27996,32 +21981,18 @@

    Unauthorised Code Modification

    - - - - - - - - - + + @@ -28030,7 +22001,7 @@

    Unauthorised Code Modification

    - + @@ -28048,7 +22019,10 @@

    Unauthorised Code Modification

    - + + + + @@ -28063,25 +22037,25 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Unauthorised Code Modification

    TermUnauthorisedCodeModificationUnauthorisedCodeDisclosure Prefix risk-owl
    LabelUnauthorised Code ModificationUnauthorised Code Disclosure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedCodeModification
    - https://w3id.org/dpv/risk#UnauthorisedCodeModification + https://w3id.org/dpv/risk/owl/#UnauthorisedCodeDisclosure
    + https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Code ModificationSomething that acts as or causes Unauthorised Code Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -28090,32 +22064,18 @@

    Unauthorised Data Access

    - - - - - - - - - + + @@ -28124,7 +22084,7 @@

    Unauthorised Data Access

    - + @@ -28133,7 +22093,7 @@

    Unauthorised Data Access

    - + @@ -28142,7 +22102,10 @@

    Unauthorised Data Access

    - + + + + @@ -28157,25 +22120,25 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Unauthorised Data Access

    TermUnauthorisedDataAccessUnauthorisedCodeModification Prefix risk-owl
    LabelUnauthorised Data AccessUnauthorised Code Modification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedDataAccess
    - https://w3id.org/dpv/risk#UnauthorisedDataAccess + https://w3id.org/dpv/risk/owl/#UnauthorisedCodeModification
    + https://w3id.org/dpv/risk#UnauthorisedCodeModification
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Data AccessSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -28184,32 +22147,18 @@

    Unauthorised Data Disclosure

    - - - - - - - - - + + @@ -28218,7 +22167,7 @@

    Unauthorised Data Disclosure

    - + @@ -28227,7 +22176,7 @@

    Unauthorised Data Disclosure

    - + @@ -28236,7 +22185,10 @@

    Unauthorised Data Disclosure

    - + + + + @@ -28251,25 +22203,25 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Unauthorised Data Disclosure

    TermUnauthorisedDataDisclosureUnauthorisedDataAccess Prefix risk-owl
    LabelUnauthorised Data DisclosureUnauthorised Data Access
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedDataDisclosure
    - https://w3id.org/dpv/risk#UnauthorisedDataDisclosure + https://w3id.org/dpv/risk/owl/#UnauthorisedDataAccess
    + https://w3id.org/dpv/risk#UnauthorisedDataAccess
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Data DisclosureSomething that acts as or causes Unauthorised Data Access
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -28278,33 +22230,18 @@

    Unauthorised Data Modification

    - - - - - - - - - + + @@ -28313,7 +22250,7 @@

    Unauthorised Data Modification

    - + @@ -28322,7 +22259,7 @@

    Unauthorised Data Modification

    - + @@ -28331,7 +22268,10 @@

    Unauthorised Data Modification

    - + + + + @@ -28346,25 +22286,25 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Impersonation

    +
    +

    Unauthorised Data Modification

    TermUnauthorisedDataModificationUnauthorisedDataDisclosure Prefix risk-owl
    LabelUnauthorised Data ModificationUnauthorised Data Disclosure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedDataModification
    - https://w3id.org/dpv/risk#UnauthorisedDataModification + https://w3id.org/dpv/risk/owl/#UnauthorisedDataDisclosure
    + https://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Data ModificationSomething that acts as or causes Unauthorised Data Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -28373,33 +22313,18 @@

    Unauthorised Impersonation

    - - - - - - - - - + + @@ -28408,7 +22333,7 @@

    Unauthorised Impersonation

    - + @@ -28417,7 +22342,7 @@

    Unauthorised Impersonation

    - + @@ -28426,7 +22351,10 @@

    Unauthorised Impersonation

    - + + + + @@ -28468,32 +22396,18 @@

    Unauthorised Information Disclosure

    - - - - - - - - - + + @@ -28502,7 +22416,7 @@

    Unauthorised Information Disclosure

    - + @@ -28520,7 +22434,10 @@

    Unauthorised Information Disclosure

    - + + + + @@ -28562,32 +22479,18 @@

    Unauthorised Re-Identification

    - - - - - - - - - + + @@ -28596,7 +22499,7 @@

    Unauthorised Re-Identification

    - + @@ -28611,7 +22514,10 @@

    Unauthorised Re-Identification

    - + + + + @@ -28653,32 +22559,18 @@

    Unauthorised Resource Use

    - - - - - - - - - + + @@ -28687,7 +22579,7 @@

    Unauthorised Resource Use

    - + @@ -28705,7 +22597,10 @@

    Unauthorised Resource Use

    - + + + + @@ -28747,32 +22642,18 @@

    Unauthorised System Access

    - - - - - - - - - + + @@ -28781,7 +22662,7 @@

    Unauthorised System Access

    - + @@ -28799,7 +22680,10 @@

    Unauthorised System Access

    - + + + + @@ -28841,32 +22725,18 @@

    Unauthorised System Modification

    - - - - - - - - - + + @@ -28875,7 +22745,7 @@

    Unauthorised System Modification

    - + @@ -28893,101 +22763,10 @@

    Unauthorised System Modification

    - - - - - - - - - - -
    TermUnauthorisedImpersonationUnauthorisedDataModification Prefix risk-owl
    LabelUnauthorised ImpersonationUnauthorised Data Modification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedImpersonation
    - https://w3id.org/dpv/risk#UnauthorisedImpersonation + https://w3id.org/dpv/risk/owl/#UnauthorisedDataModification
    + https://w3id.org/dpv/risk#UnauthorisedDataModification
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:NonMaterialDamage - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised ImpersonationSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Information DisclosureSomething that acts as or causes Unauthorised Information Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Reidentification - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Re-IdentificationSomething that acts as or causes Unauthorised Re-Identification
    Date Created 2022-08-19
    Date Modified2024-08-16
    Contributors Georg P. Krog Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised Resource UseSomething that acts as or causes Unauthorised Resource Use
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised System AccessSomething that acts as or causes Unauthorised System Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnauthorised System ModificationSomething that acts as or causes Unauthorised System Modification
    Date Created 2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    - - - -
    -

    Unknown Vulnerability Exploited

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + - - - - - - - - @@ -29029,32 +22808,18 @@

    Unwanted Code Deletion

    - - - - - - - - - + + @@ -29063,7 +22828,7 @@

    Unwanted Code Deletion

    - + @@ -29081,7 +22846,10 @@

    Unwanted Code Deletion

    - + + + + @@ -29123,32 +22891,18 @@

    Unwanted Data Deletion

    - - - - - - - - - - - + + + + + @@ -29157,7 +22911,7 @@

    Unwanted Data Deletion

    - + @@ -29175,7 +22929,10 @@

    Unwanted Data Deletion

    - + + + + @@ -29217,32 +22974,18 @@

    Unwanted Disclosure of Data

    - - - - - - - - - + + @@ -29251,7 +22994,7 @@

    Unwanted Disclosure of Data

    - + @@ -29269,7 +23012,10 @@

    Unwanted Disclosure of Data

    - + + + + @@ -29284,25 +23030,25 @@

    Unwanted Disclosure of Data

    -
    -

    Vandalism

    +
    +

    User Risks

    TermUnknownVulnerabilityExploitedPrefixrisk-owl
    LabelUnknown Vulnerability Exploited
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnknownVulnerabilityExploited
    - https://w3id.org/dpv/risk#UnknownVulnerabilityExploited -
    Type rdfs:Class - , owl:Class - , dpv-owl:Risk -
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnknown Vulnerability Exploited
    SourceENISA Reference Incident Classification Taxonomy 2018Date Modified2024-08-16
    Date Created2022-08-17
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnwanted Code DeletionSomething that acts as or causes Unwanted Code Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
    DefinitionUnwanted Data DeletionSomething that acts as or causes Unwanted Data Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionUnwanted Disclosure of DataSomething that acts as or causes Unwanted Disclosure of Data
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -29311,32 +23057,17 @@

    Vandalism

    - - - - - - - - - + + @@ -29345,29 +23076,20 @@

    Vandalism

    - + - - - - + - - - - + + - - - - @@ -29906,25 +23628,25 @@

    Very Low Severity

    -
    -

    Violation of Code of Conduct

    +
    +

    Violating Code of Conduct

    TermVandalismUserRisks Prefix risk-owl
    LabelVandalismUser Risks
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Vandalism
    - https://w3id.org/dpv/risk#Vandalism + https://w3id.org/dpv/risk/owl/#UserRisks
    + https://w3id.org/dpv/risk#UserRisks
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionVandalismConcepts associated with risks that arise due to User or Human use
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + - + @@ -29933,32 +23655,18 @@

    Violation of Code of Conduct

    - - - - - - - - - + + @@ -29967,9 +23675,12 @@

    Violation of Code of Conduct

    - + - + + + + @@ -29985,7 +23696,10 @@

    Violation of Code of Conduct

    - + + + + @@ -30000,25 +23714,25 @@

    Violation of Code of Conduct

    -
    -

    Violation of Contractual Obligations

    +
    +

    Violation of Contractual Obligation

    TermViolationCodeConductViolatingCodeOfConduct Prefix risk-owl
    LabelViolation of Code of ConductViolating Code of Conduct
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolationCodeConduct
    - https://w3id.org/dpv/risk#ViolationCodeConduct + https://w3id.org/dpv/risk/owl/#ViolatingCodeOfConduct
    + https://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionViolation of Code of ConductSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -30027,32 +23741,18 @@

    Violation of Contractual Obligations

    - - - - - - - - - + + @@ -30061,9 +23761,12 @@

    Violation of Contractual Obligations

    - + - + + + + @@ -30079,7 +23782,10 @@

    Violation of Contractual Obligations

    - + + + + @@ -30094,25 +23800,25 @@

    Violation of Contractual Obligations

    -
    -

    Violation of Ethical Code

    +
    +

    Violating Ethics Code

    TermViolationContractualObligationsViolatingContractualObligation Prefix risk-owl
    LabelViolation of Contractual ObligationsViolation of Contractual Obligation
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolationContractualObligations
    - https://w3id.org/dpv/risk#ViolationContractualObligations + https://w3id.org/dpv/risk/owl/#ViolatingContractualObligation
    + https://w3id.org/dpv/risk#ViolatingContractualObligation
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionViolation of Contractual ObligationsSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -30121,32 +23827,18 @@

    Violation of Ethical Code

    - - - - - - - - - + + @@ -30155,9 +23847,12 @@

    Violation of Ethical Code

    - + - + + + + @@ -30173,7 +23868,10 @@

    Violation of Ethical Code

    - + + + + @@ -30188,25 +23886,25 @@

    Violation of Ethical Code

    -
    -

    Violation of Rights

    +
    +

    Violation of Legal Obligations

    TermViolationEthicalCodeViolatingEthicsCode Prefix risk-owl
    LabelViolation of Ethical CodeViolating Ethics Code
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolationEthicalCode
    - https://w3id.org/dpv/risk#ViolationEthicalCode + https://w3id.org/dpv/risk/owl/#ViolatingEthicsCode
    + https://w3id.org/dpv/risk#ViolatingEthicsCode
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionViolation of Ethical CodeSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -30215,33 +23913,18 @@

    Violation of Rights

    - - - - - - - - - + + @@ -30250,25 +23933,34 @@

    Violation of Rights

    - + - + + + + - + + + + - + - + + + + - + @@ -30280,25 +23972,25 @@

    Violation of Rights

    -
    -

    Violation of Regulatory Obligations

    +
    +

    Violating Policy

    TermViolationOfRightsViolatingLegalObligation Prefix risk-owl
    LabelViolation of RightsViolation of Legal Obligations
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolationOfRights
    - https://w3id.org/dpv/risk#ViolationOfRights + https://w3id.org/dpv/risk/owl/#ViolatingLegalObligation
    + https://w3id.org/dpv/risk#ViolatingLegalObligation
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionViolation of RightsSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented in
    - + - + @@ -30307,32 +23999,18 @@

    Violation of Regulatory Obligations

    - - - - - - - - - + + @@ -30341,29 +24019,20 @@

    Violation of Regulatory Obligations

    - + - - - - + - - - - + + - - - - @@ -30374,13 +24043,13 @@

    Violation of Regulatory Obligations

    -
    +

    Violation of Statutory Obligations

    TermViolationRegulatoryObligationsViolatingPolicy Prefix risk-owl
    LabelViolation of Regulatory ObligationsViolating Policy
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolationRegulatoryObligations
    - https://w3id.org/dpv/risk#ViolationRegulatoryObligations + https://w3id.org/dpv/risk/owl/#ViolatingPolicy
    + https://w3id.org/dpv/risk#ViolatingPolicy
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionViolation of Regulatory ObligationsSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-consequences
    - + @@ -30391,8 +24060,8 @@

    Violation of Statutory Obligations

    @@ -30401,32 +24070,18 @@

    Violation of Statutory Obligations

    - - - - - - - - - + + @@ -30435,9 +24090,12 @@

    Violation of Statutory Obligations

    - + - + + + + @@ -30453,7 +24111,10 @@

    Violation of Statutory Obligations

    - + + + + @@ -30467,25 +24128,26 @@

    Violation of Statutory Obligations

    -
    -

    Vulnerability

    + +
    +

    Violence against children

    TermViolationStatutoryObligationsViolatingStatutoryObligations Prefix risk-owl
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolationStatutoryObligations
    - https://w3id.org/dpv/risk#ViolationStatutoryObligations + https://w3id.org/dpv/risk/owl/#ViolatingStatutoryObligations
    + https://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Damage - → dpv-owl:Risk + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionViolation of Statutory ObligationsSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + @@ -30494,24 +24156,17 @@

    Vulnerability

    + + + - - - - - - - - - + + @@ -30520,52 +24175,63 @@

    Vulnerability

    - + - + + + + - + + + + - + - - + + + + + + + + - +
    TermVulnerabilityViolenceAgainstChildren Prefix risk-owl
    LabelVulnerabilityViolence against children
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Vulnerability
    - https://w3id.org/dpv/risk#Vulnerability + https://w3id.org/dpv/risk/owl/#ViolenceAgainstChildren
    + https://w3id.org/dpv/risk#ViolenceAgainstChildren
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
    Sub-class of risk-owl:IndividualRisk +
    in Domain of risk-owl:isExploitedBy, - risk-owl:isVulnerabilityOf -
    in Range of risk-owl:causedByVulnerability, - risk-owl:exploitsVulnerability, - risk-owl:hasVulnerability -
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-consequences
    - -
    -

    Vulnerability Created

    +
    +

    Vulnerability

    - + - + @@ -30574,30 +24240,22 @@

    Vulnerability Created

    - - - + - - @@ -30608,32 +24266,26 @@

    Vulnerability Created

    - + - - - - + - + - - - - + - +
    TermVulnerabilityCreatedVulnerability Prefix risk-owl
    LabelVulnerability CreatedVulnerability
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VulnerabilityCreated
    - https://w3id.org/dpv/risk#VulnerabilityCreated + https://w3id.org/dpv/risk/owl/#Vulnerability
    + https://w3id.org/dpv/risk#Vulnerability
    Type rdfs:Class , owl:Class - , dpv-owl:Risk
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk -
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource + risk-owl:isExploitedBy, + risk-owl:isVulnerabilityOf
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk + risk-owl:causedByVulnerability, + risk-owl:exploitsVulnerability, + risk-owl:hasVulnerability
    DefinitionVulnerability CreatedIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Core
    @@ -30641,25 +24293,25 @@

    Vulnerability Created

    -
    -

    Vulnerability Exploited

    +
    +

    Vulnerability Created

    - + - + @@ -30668,32 +24320,18 @@

    Vulnerability Exploited

    - - - - - - - - - + + @@ -30702,7 +24340,7 @@

    Vulnerability Exploited

    - + @@ -30711,7 +24349,7 @@

    Vulnerability Exploited

    - + @@ -30720,7 +24358,10 @@

    Vulnerability Exploited

    - + + + + @@ -30848,84 +24489,6 @@

    Properties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -31125,18 +24688,6 @@

    caused by vulnerability

    - - - - - - - - - - - - @@ -31165,54 +24716,6 @@

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -31344,15 +24847,6 @@

    exploits vulnerability

    - - - - - - - - - @@ -31753,6 +25247,8 @@

    has vulnerability

    + + @@ -31765,15 +25261,6 @@

    has vulnerability

    - - - - - - - - - @@ -31967,72 +25454,21 @@

    is vulnerability of

    - - - - - - - - - - - - - -
    TermVulnerabilityExploitedVulnerabilityCreated Prefix risk-owl
    LabelVulnerability ExploitedVulnerability Created
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VulnerabilityExploited
    - https://w3id.org/dpv/risk#VulnerabilityExploited + https://w3id.org/dpv/risk/owl/#VulnerabilityCreated
    + https://w3id.org/dpv/risk#VulnerabilityCreated
    Type rdfs:Class , owl:Class - , dpv-owl:Risk + , dpv-owl:RiskConcept
    Sub-class of risk-owl:Detriment - → dpv-owl:Risk + risk-owl:InternalSecurityThreat + → dpv-owl:RiskConcept
    in Domain of dpv-owl:hasResidualRisk, - dpv-owl:hasRiskLevel, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasRiskSource -
    in Range of dpv-owl:hasRisk, - dpv-owl:isResidualRiskOf, - dpv-owl:mitigatesRisk, - risk-owl:refersToRisk -
    DefinitionVulnerability ExploitedSomething that acts as or causes Vulnerability Created
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Date Created2024-02-14
    Documented inRisk Core
    -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + Date Created + 2024-02-14 + + + + + Documented in + Risk Core + + + +
    @@ -32676,24 +26112,6 @@

    refers to risk

    - - - - - - - - - - - - - - - - - - @@ -32798,81 +26216,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32898,17 +26241,9 @@

    External

    - - - - - - - - @@ -32920,7 +26255,6 @@

    External

    - @@ -32929,17 +26263,14 @@

    External

    - - - @@ -32966,12 +26297,9 @@

    External

    - - - @@ -32985,59 +26313,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -33052,10 +26327,6 @@

    External

    - - - - @@ -33064,11 +26335,6 @@

    External

    - - - - - @@ -33092,7 +26358,6 @@

    External

    - @@ -33134,26 +26399,20 @@

    External

    - - - - - - @@ -33242,46 +26501,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -33290,10 +26509,6 @@

    External

    - - - - @@ -33305,10 +26520,8 @@

    External

    - - @@ -33755,28 +26968,13 @@

    External

    - - - - - - - - - - - - - - - @@ -33905,9 +27103,6 @@

    External

    - - - diff --git a/2.1-dev/risk/risk-owl.jsonld b/2.1-dev/risk/risk-owl.jsonld index b580649f7..27ac672c1 100644 --- a/2.1-dev/risk/risk-owl.jsonld +++ b/2.1-dev/risk/risk-owl.jsonld @@ -1,9 +1,9 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#CostInstallation", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14,12 +14,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -29,7 +24,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -41,37 +36,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Installation" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Installation" - } - ] - }, - { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -87,7 +66,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -109,20 +88,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -137,9 +116,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -149,7 +128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -161,37 +140,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Eavesdropping", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -202,12 +165,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -217,7 +175,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -229,37 +187,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Eavesdropping" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Eavesdropping" - } - ] - }, - { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -270,7 +212,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -280,7 +227,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -292,21 +239,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes non-material damages" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -320,9 +267,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955" + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -332,7 +285,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -344,18 +297,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Sabotage" } ] }, { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955", + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", "@type": [ "https://schema.org/WebPage" ], @@ -371,16 +324,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -390,7 +359,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -402,32 +371,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" + } + ] + }, + { + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossControlOverData", + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -437,7 +428,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -449,18 +440,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Control over Data" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Control over Data" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -478,7 +500,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -490,18 +512,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -520,7 +542,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -542,21 +564,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -567,7 +589,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -577,7 +610,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -589,27 +622,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes material damages" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -619,7 +673,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -631,26 +685,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -660,7 +731,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -672,21 +743,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -697,12 +784,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -712,13 +805,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -730,24 +817,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" + "@value": "Erroneous System Use" + } + ] + }, + { + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -766,7 +863,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -776,7 +873,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -788,21 +885,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MisuseBreachedInformation", + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -813,12 +910,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -828,7 +920,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -840,36 +932,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Misuse of Breached Information" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse of Breached Information" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42", + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#Severity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Scale with 3 Severity Levels from High to Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostSuspendedOperations", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -884,9 +1007,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe" + "@id": "_:N804ad242900c474395dd117c74dace8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -896,7 +1025,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -908,18 +1037,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Suspended Operations" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Suspended Operations" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe", + "@id": "_:N804ad242900c474395dd117c74dace8e", "@type": [ "https://schema.org/WebPage" ], @@ -935,230 +1064,161 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ - { - "@value": "Julio Fernandez" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Rob Brennan" - }, { "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Julian Flake" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:N4387faf4bb854435bfdc47ebf666782a" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@language": "en", + "@value": "Something that acts as or causes Unauthorised System Access" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Unauthorised System Access" } + ] + }, + { + "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@type": [ + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/publisher": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "risk" + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Individual Risk" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "RISK" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Control that avoids the risk source" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CitizensImpact", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1172,9 +1232,23 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68" + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1184,7 +1258,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1196,53 +1270,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Data Breach" } ] }, { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68", + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialEquipmentCosts", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1250,11 +1323,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1264,36 +1332,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "has risk source" } - ] - }, - { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1308,9 +1370,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1320,7 +1382,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1332,37 +1394,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1373,12 +1419,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1388,7 +1434,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1400,27 +1446,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalSpying", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1434,9 +1510,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7757aee6b2134fec952a142a9d692e19" + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1446,7 +1528,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1458,18 +1540,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Spying" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Spying" + "@value": "Security Breach" } ] }, { - "@id": "_:N7757aee6b2134fec952a142a9d692e19", + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", "@type": [ "https://schema.org/WebPage" ], @@ -1485,7 +1567,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1504,7 +1586,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1514,7 +1596,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1526,21 +1608,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1551,7 +1633,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1561,7 +1648,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1573,21 +1660,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossAssets", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1601,9 +1694,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b" + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1613,7 +1712,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1625,42 +1724,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Assets" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Assets" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b", + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1670,7 +1786,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1682,21 +1798,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1710,9 +1842,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1722,7 +1860,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1734,32 +1872,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISa Trust Services Security Incidents 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1769,7 +1917,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1781,21 +1929,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1806,12 +1954,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1821,7 +1975,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1833,58 +1987,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalStalking", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1898,9 +2031,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec" + "@id": "_:N903ec696d7504183af4ba63f3f295e8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1910,7 +2049,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1922,42 +2061,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Stalking" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Stalking" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec", + "@id": "_:N903ec696d7504183af4ba63f3f295e8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1967,7 +2123,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Notice" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1979,36 +2135,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2016,6 +2189,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2025,47 +2203,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2075,7 +2244,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2087,21 +2256,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonnelAbsence", + "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2112,12 +2281,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2127,7 +2296,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2139,36 +2314,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2180,7 +2376,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2190,7 +2392,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2202,32 +2404,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationOfRights", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2237,7 +2444,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2249,36 +2456,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Risk Matrix" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "IEC 31010:2019" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nad476399871e41a5bd37e1133df27770" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2286,6 +2516,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2295,31 +2530,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" + "@value": "Identity Theft" } + ] + }, + { + "@id": "_:Nad476399871e41a5bd37e1133df27770", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "ENISA Threat Taxonomy 2016" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2333,9 +2574,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N834144a719d041d4970f5c070cc5f001" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2345,7 +2586,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2357,37 +2598,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:N834144a719d041d4970f5c070cc5f001", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#TheftMedia", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2401,9 +2626,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0" + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2413,30 +2644,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0", + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", "@type": [ "https://schema.org/WebPage" ], @@ -2452,10 +2689,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2466,7 +2703,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2476,74 +2724,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "Violation of Legal Obligations" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "accepted" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } + ] + }, + { + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Availability Incident" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2554,7 +2783,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2564,7 +2798,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2576,27 +2810,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Extremely Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationTrustImpact", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2610,9 +2844,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2622,7 +2856,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2634,34 +2868,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Reputation and trust impact" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputation and trust impact" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642", + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/source": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Assessment of risk involving its identification, analysis, and evaluation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2680,7 +2945,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2702,20 +2967,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2730,9 +2995,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.67,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbeddee22b7a841e39879764ab63949f8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2742,7 +3013,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2754,32 +3025,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Impact", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2789,7 +3081,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2801,21 +3093,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact(s) that acts as or causes benefits" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Accidental Misuse" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2829,9 +3157,18 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f" + "@id": "_:N698cebdfba864777b23d25052c4d2493" + }, + { + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2841,7 +3178,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2853,88 +3193,83 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Spoofing" } ] }, { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f", + "@id": "_:N698cebdfba864777b23d25052c4d2493", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.11,xsd:decimal" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2949,9 +3284,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1b96d48534be4188984fec841d97a254" + "@id": "_:N347037135ba54cefae0a2a69a47e52d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2961,7 +3302,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2973,18 +3314,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N1b96d48534be4188984fec841d97a254", + "@id": "_:N347037135ba54cefae0a2a69a47e52d9", "@type": [ "https://schema.org/WebPage" ], @@ -3000,10 +3341,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3017,9 +3358,18 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7" + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" + }, + { + "@id": "_:N51a29309d655420e8611a50e7d2baa7c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3029,7 +3379,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3041,36 +3391,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7", + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@id": "_:N51a29309d655420e8611a50e7d2baa7c", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3082,7 +3448,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3092,7 +3463,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3104,20 +3475,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3129,7 +3500,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N540e39aa17014568ba5a2b03534c1f19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3139,7 +3521,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3151,62 +3533,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@id": "_:N540e39aa17014568ba5a2b03534c1f19", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Vulnerability" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BusinessPerformanceImpairment", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3220,9 +3577,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N42235d0a675a4bf393d379a4650a468b" + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3232,7 +3595,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3244,48 +3607,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N42235d0a675a4bf393d379a4650a468b", + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceOnDataSecurity", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na66b6d002d3f448981a58870da1a686e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3295,7 +3669,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3307,21 +3681,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3359,21 +3749,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3384,12 +3774,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3399,7 +3784,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3411,48 +3796,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A type of social engineering attack involving deceptive messages intended to reveal sensitive information" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Change Consequence" } ] }, { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ImpactOnDataSubject", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@id": "_:N1802c2900f5b4c578896c91c3149381d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3462,44 +3842,60 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact on Data Subject" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact on Data Subject" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "_:N1802c2900f5b4c578896c91c3149381d", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3509,7 +3905,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3521,30 +3917,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -3567,31 +3958,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "caused by vulnerability" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3607,7 +3993,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3617,7 +4003,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3629,21 +4015,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Stalking", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3657,9 +4043,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01" + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3669,7 +4061,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3681,36 +4073,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Stalking" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Stalking" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01", + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3722,12 +4114,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3737,7 +4129,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3749,21 +4144,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostOperationInterruption", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3777,9 +4178,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3789,7 +4190,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3801,36 +4202,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3842,12 +4257,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3857,13 +4273,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3875,40 +4285,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "Re-identification" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3916,7 +4315,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3928,21 +4327,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Concepts associated with security threats and issues that originate within the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Internal Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3953,12 +4352,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3968,7 +4373,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3980,79 +4385,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossCompetitiveAdvantage", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4066,9 +4429,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4" + "@id": "_:Nd8a232e440f041b496b97da8007b588a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4078,7 +4447,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4090,18 +4459,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Competitive Advantage" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Competitive Advantage" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4", + "@id": "_:Nd8a232e440f041b496b97da8007b588a", "@type": [ "https://schema.org/WebPage" ], @@ -4117,26 +4486,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4146,7 +4504,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4158,21 +4516,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4183,12 +4541,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4198,7 +4556,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4210,55 +4574,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" - } - ] - }, - { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Moderate Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Theft", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0987f80167844b359aae438673b4fe3b" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4266,7 +4604,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4278,53 +4616,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft" - } - ] - }, - { - "@id": "_:N0987f80167844b359aae438673b4fe3b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad" + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4334,65 +4663,86 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Fee" } ] }, { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with security threats that are likely to originate externally" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossGoods", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N26efb77318794637980a0cf151019d5e" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4402,7 +4752,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4414,53 +4764,33 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Goods" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Goods" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "_:N26efb77318794637980a0cf151019d5e", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4470,7 +4800,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4482,36 +4812,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" - } - ] - }, - { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4526,9 +4840,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98" + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4538,7 +4858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4550,37 +4870,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98", + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChildViolence", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4594,11 +4914,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4606,7 +4921,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4618,34 +4933,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Child Violence" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Child Violence" - } - ] - }, - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4664,7 +4963,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4686,21 +4985,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAssessment", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4714,11 +5013,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4726,7 +5020,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4738,53 +5032,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DamageByThirdParty", + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4794,7 +5062,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4806,36 +5074,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Damage by Third Party" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage by Third Party" + "@value": "Containment Control" } ] }, { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4847,7 +5130,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4857,7 +5140,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4869,20 +5152,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4894,12 +5176,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4909,7 +5186,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4921,20 +5198,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4955,7 +5233,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4967,21 +5245,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4992,7 +5270,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5002,7 +5285,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5014,32 +5297,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5049,7 +5337,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5061,26 +5349,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5088,11 +5381,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5102,18 +5390,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#Likelihood", @@ -5132,7 +5425,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5157,74 +5450,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Very Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", - "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Halted" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5235,12 +5481,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5250,13 +5496,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5268,27 +5508,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5302,9 +5536,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62" + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5314,7 +5554,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5326,34 +5566,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Injury" } ] }, { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62", + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -5372,7 +5612,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5394,37 +5634,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptionCommunications", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb9fe3106440c4546b4b449106947b906" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5434,7 +5663,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5446,34 +5675,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Interception of Communications" - } - ] - }, - { - "@id": "_:Nb9fe3106440c4546b4b449106947b906", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskLevel", @@ -5492,7 +5705,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5501,6 +5714,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, { "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, @@ -5517,26 +5733,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "Low Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5548,12 +5764,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5563,7 +5774,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5575,52 +5786,62 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - N3 serialiation" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5634,17 +5855,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5654,7 +5867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5666,37 +5879,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Intentional Misuse" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5710,9 +5943,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb24249010a4a495187a77d855cd41e79" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5722,7 +5955,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5734,37 +5967,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:Nb24249010a4a495187a77d855cd41e79", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossCredibility", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5778,9 +5995,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5790,7 +6007,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5802,36 +6019,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/turtle/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossData", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5846,9 +6078,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5858,7 +6090,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5870,48 +6102,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Data" - } - ] - }, - { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5921,7 +6132,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Benefit" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5933,21 +6144,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compensation provided (as an impact)" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5958,12 +6169,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5973,7 +6184,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5985,39 +6202,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.40,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6025,7 +6232,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6037,21 +6244,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6062,7 +6275,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6072,7 +6290,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6084,21 +6308,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedImpersonation", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6112,9 +6372,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4" + "@id": "_:N61513676426149faae9e58063eb667d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6124,7 +6390,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6136,42 +6402,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "Coercion" } ] }, { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4", + "@id": "_:N61513676426149faae9e58063eb667d8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6181,7 +6464,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6193,21 +6476,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "System Intrusion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6218,12 +6517,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.80,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6233,7 +6527,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6245,37 +6539,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6285,13 +6568,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6303,27 +6580,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6339,7 +6610,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6361,21 +6632,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6389,61 +6660,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N625ea761ef2c46e49325339e76de3953" + "@id": "_:Neb960f38438d48258bee0ebae96be48e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6453,7 +6678,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6465,43 +6690,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N625ea761ef2c46e49325339e76de3953", + "@id": "_:Neb960f38438d48258bee0ebae96be48e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6511,7 +6746,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6523,21 +6758,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationEthicalCode", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6551,9 +6786,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c" + "@id": "_:N498890541a5449e290f0aea406ea5090" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6563,7 +6804,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6575,18 +6816,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Ethical Code" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Ethical Code" + "@value": "Scam" } ] }, { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c", + "@id": "_:N498890541a5449e290f0aea406ea5090", "@type": [ "https://schema.org/WebPage" ], @@ -6602,10 +6843,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PrivacyImpact", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6619,9 +6860,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101" + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6631,7 +6878,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6643,36 +6890,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Privacy impact" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy impact" + "@value": "Extorsion" } ] }, { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101", + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6684,12 +6931,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6699,10 +6941,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6714,40 +6953,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityDispute", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-24" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6755,7 +6977,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6767,26 +6989,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Threat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6796,7 +7029,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6808,37 +7041,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6848,7 +7076,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6860,239 +7088,257 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Risk Source" } ] }, { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", - "@type": [ - "https://w3id.org/dpv/owl#Impact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ + "@value": "http://www.w3.org/2004/02/skos/core" + }, { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "@id": "http://www.w3.org/2002/07/owl" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "http://www.w3.org/2000/01/rdf-schema" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@value": "Axel Polleres" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Georg P. Krog" + }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Renumeration provided as compensation (as an impact)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@value": "Delaram Golpayegani" + }, { "@language": "en", - "@value": "Remuneration" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Payment", - "@type": [ - "https://w3id.org/dpv/owl#Impact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ + "@value": "Beatriz Esteves" + }, { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/description": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/hasVersion": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ { - "@language": "en", - "@value": "Payment provided as compensation (as an impact)" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Payment" + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.22,xsd:decimal" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "accepted" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "RISK" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2.1-dev" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Incident Register" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7100,6 +7346,17 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7109,26 +7366,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "Low Severity" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Businessdisruption", + "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7142,9 +7400,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na71895376af947a9838430e3e01d3915" + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7154,7 +7418,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7166,18 +7430,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business disruption" + "@value": "Something that acts as or causes Vulnerability Created" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business disruption" + "@value": "Vulnerability Created" } ] }, { - "@id": "_:Na71895376af947a9838430e3e01d3915", + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", "@type": [ "https://schema.org/WebPage" ], @@ -7193,3385 +7457,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HealthLifeImpact", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Health and life impact" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Health and life impact" - } - ] - }, - { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Copyright Violation" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Copyright Violation" - } - ] - }, - { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossCustomerConfidence", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N849c56349f884574b5accd799cf4b01d" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Customer Confidence" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Customer Confidence" - } - ] - }, - { - "@id": "_:N849c56349f884574b5accd799cf4b01d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#GovernmentCrisis", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Government Crisis" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Government Crisis" - } - ] - }, - { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Source Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Threat Source" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", - "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Terminated" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossGoodwill", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Goodwill" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Goodwill" - } - ] - }, - { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#InternalOperationDisruption", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Internal Operation Disruption" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Internal Operation Disruption" - } - ] - }, - { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the use of specified control" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CostJudicialProceedings", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Judicial Proceedings" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Judicial Proceedings" - } - ] - }, - { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na7ae462a47ff4a078544c1576af327df" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Equipment Malfunction" - } - ] - }, - { - "@id": "_:Na7ae462a47ff4a078544c1576af327df", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.86,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Intentional use of software by including or inserting in a system for a harmful purpose" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RemoteSpying", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N76f8e9999d454353951813283e46b250" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Remote Spying" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Remote Spying" - } - ] - }, - { - "@id": "_:N76f8e9999d454353951813283e46b250", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossTechnologicalAdvantage", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Technological Advantage" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Technological Advantage" - } - ] - }, - { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossCustomers", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Customers" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Customers" - } - ] - }, - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.14,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Harm", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes harms" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Harm" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ] - }, - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes detriments" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Detriment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", - "@type": [ - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CyberSpying", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cyber Spying" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cyber Spying" - } - ] - }, - { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceForDataSubject", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Consequence for Data Subject" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Consequence for Data Subject" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Damage", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes damages" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Damage" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountSecurity", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compromise Account Security" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Compromise Account Security" - } - ] - }, - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", - "@type": [ - "https://w3id.org/dpv/owl#Severity", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Severity" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "3 Severity Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ImpactToRights", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Impact to Rights" - } - ] - }, - { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", - "@type": [ - "https://w3id.org/dpv/owl#Severity", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Severity" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "5 Severity Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N314876c286064f38bbd79769edaa4106" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Damage" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unauthorised Code Modification" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N314876c286064f38bbd79769edaa4106", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#FinancialInvestigationCosts", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Financial Investigation Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Investigation Costs" - } - ] - }, - { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Coercion" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", - "@type": [ - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Matrix 3x3" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnknownVulnerabilityExploited", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unknown Vulnerability Exploited" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unknown Vulnerability Exploited" - } - ] - }, - { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MisinformationDisinformation", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Misinformation and Disinformation" - } - ] - }, - { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.60,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Remove Consequence" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LawEnforcementAdverseEffects", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Law Enforcement Adverse Effects" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Law Enforcement Adverse Effects" - } - ] - }, - { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" - } + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "System Intrusion" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "System Intrusion" + "@value": "Risk Concepts - HTML serialiation" } - ] - }, - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk/risk-owl.html" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10590,7 +7507,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10600,7 +7517,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10612,18 +7529,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -10653,21 +7570,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10681,6 +7598,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10688,7 +7610,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10700,20 +7625,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10725,12 +7656,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N471809172d6943bf838438296ceb4144" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10740,7 +7666,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10752,37 +7678,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:N471809172d6943bf838438296ceb4144", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10798,7 +7708,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10808,7 +7718,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10820,20 +7730,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10848,9 +7758,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790" + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10860,30 +7776,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790", + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", "@type": [ "https://schema.org/WebPage" ], @@ -10899,15 +7821,26 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10917,7 +7850,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10929,21 +7862,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10976,20 +7909,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialPersonnelCosts", + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -11001,12 +7939,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8" + "@id": "_:N837e146fba804365b9e619c05849f3d1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11016,7 +7954,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11028,78 +7966,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Personnel Costs" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Personnel Costs" + "@value": "Risk Analysis" } ] }, { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8", + "@id": "_:N837e146fba804365b9e619c05849f3d1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Deliberate Incident" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11110,12 +8007,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11125,13 +8022,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11143,43 +8034,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11189,7 +8063,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11201,37 +8075,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11241,7 +8116,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11253,48 +8128,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scam" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11304,7 +8169,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11316,27 +8181,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11346,7 +8216,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11358,21 +8228,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11383,12 +8253,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2adacc609baf48e9b49883302a41f00c" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11398,7 +8268,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11410,36 +8286,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:N2adacc609baf48e9b49883302a41f00c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Moderate Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -11451,12 +8316,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11466,7 +8326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11478,37 +8338,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harmful Speech" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harmful Speech" - } - ] - }, - { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11519,12 +8363,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11534,7 +8379,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11546,36 +8391,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Environmental Safety Endangerment" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Safety Endangerment" - } - ] - }, - { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossReputation", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -11590,9 +8425,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na656b20429c445f88a1845779a6748c4" + "@id": "_:N0296c48d481641d492572a05652b6bf5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11602,7 +8443,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11614,18 +8455,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Reputation" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Reputation" + "@value": "Financial Loss" } ] }, { - "@id": "_:Na656b20429c445f88a1845779a6748c4", + "@id": "_:N0296c48d481641d492572a05652b6bf5", "@type": [ "https://schema.org/WebPage" ], @@ -11641,67 +8482,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "2022-08-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11711,7 +8512,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11723,39 +8524,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ServiceInterruption", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11763,7 +8548,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11775,36 +8560,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Service Interruption" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Service Interruption" - } - ] - }, - { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -11819,9 +8588,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11831,7 +8600,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11843,36 +8612,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Opportunity" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Opportunity" - } - ] - }, - { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AbusiveContentUtilisation", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -11884,12 +8637,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11899,7 +8647,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11911,53 +8659,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Abusive Content Utilisation" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Abusive Content Utilisation" - } - ] - }, - { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CyberStalking", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11967,7 +8700,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11979,50 +8712,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cyber Stalking" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cyber Stalking" - } - ] - }, - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12030,7 +8742,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12042,26 +8754,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12071,7 +8794,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12083,32 +8806,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12118,7 +8846,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12130,21 +8858,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Misuse" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RansomwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12158,12 +8886,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N5e35e90757324413800afec9a109dbc4" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12173,7 +8898,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12185,53 +8910,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ransomware Attack" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } - ] - }, - { - "@id": "_:N5e35e90757324413800afec9a109dbc4", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates an incident is associated with the specified context" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostConfiguration", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12245,9 +8984,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0" + "@id": "_:N842f6dd3b92c482180f56ce6a495c382" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12257,7 +9002,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12269,18 +9014,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Configuration" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Configuration" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0", + "@id": "_:N842f6dd3b92c482180f56ce6a495c382", "@type": [ "https://schema.org/WebPage" ], @@ -12296,10 +9041,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12313,9 +9058,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12325,7 +9070,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12337,37 +9082,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12381,9 +9110,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12393,7 +9122,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12405,37 +9134,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12446,7 +9159,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12456,7 +9174,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12468,21 +9186,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostJudicialPenalties", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12496,9 +9214,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12508,7 +9226,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12520,53 +9238,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Judicial Penalties" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Judicial Penalties" - } - ] - }, - { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12574,11 +9270,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12588,27 +9279,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12618,7 +9324,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12630,37 +9342,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.14,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12668,11 +9380,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12682,20 +9389,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RetrievalDeletedData", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -12710,9 +9422,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961" + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12722,7 +9440,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12734,18 +9452,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Retrieval of Deleted Data" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Retrieval of Deleted Data" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961", + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", "@type": [ "https://schema.org/WebPage" ], @@ -12761,21 +9479,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12785,7 +9497,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12797,21 +9509,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReplacementCosts", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12825,9 +9537,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4c9741bd041f4390a8836eff65dee208" + "@id": "_:N2039355de6a7474a8ab35355297e33c6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12837,7 +9555,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12849,53 +9567,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Replacement Costs" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Replacement Costs" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N4c9741bd041f4390a8836eff65dee208", + "@id": "_:N2039355de6a7474a8ab35355297e33c6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.57,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12903,11 +9620,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12917,31 +9629,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "is exploited by" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/domainIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12949,6 +9666,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12958,56 +9680,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationRegulatoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13019,12 +9705,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13034,7 +9715,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13045,43 +9726,38 @@ ], "http://www.w3.org/2004/02/skos/core#definition": [ { - "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ] - }, - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13091,7 +9767,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13103,21 +9779,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossSuppliers", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13131,9 +9813,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13143,7 +9825,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13155,37 +9837,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Suppliers" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Suppliers" - } - ] - }, - { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13199,9 +9865,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N30752965a65a41159a1711755717d53a" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13211,7 +9877,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13223,48 +9889,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N30752965a65a41159a1711755717d53a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LimitationOfRights", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13274,7 +9929,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13286,21 +9941,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13314,9 +9969,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13326,7 +9981,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13338,37 +9993,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Negotiating Capacity" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Negotiating Capacity" - } - ] - }, - { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13384,7 +10023,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13406,20 +10045,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13431,7 +10070,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13441,7 +10091,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13453,21 +10103,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13481,9 +10153,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b" + "@id": "_:N3ef9f5a9eb554279905f69c263712205" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13493,7 +10171,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13505,53 +10183,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "System Failure" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Blackmail" } ] }, { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b", + "@id": "_:N3ef9f5a9eb554279905f69c263712205", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13561,13 +10251,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/owl#RiskConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13579,26 +10266,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "Incident" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13609,12 +10297,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13624,7 +10312,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13636,20 +10324,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13661,12 +10348,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.33,xsd:decimal" + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13676,7 +10363,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13688,21 +10375,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13716,9 +10403,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13728,7 +10415,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13740,36 +10427,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13781,12 +10452,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.06,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13796,7 +10462,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13808,37 +10474,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.41,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13848,7 +10515,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13860,32 +10527,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13895,7 +10568,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13907,20 +10580,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13935,9 +10608,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1" + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13947,7 +10626,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13959,18 +10638,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Public Order Breach" } ] }, { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1", + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", "@type": [ "https://schema.org/WebPage" ], @@ -13986,9 +10665,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14000,12 +10679,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14015,10 +10694,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14030,44 +10706,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -14076,7 +10761,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14088,37 +10773,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Judicial Penalty" } ] }, { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComplianceImpact", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14132,9 +10832,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14144,7 +10844,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14156,36 +10856,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compliance impact" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compliance impact" - } - ] - }, - { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalProcessingData", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14200,9 +10884,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578" + "@id": "_:N12b2c9394da44250a5ab771adc23fab8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14212,7 +10902,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14224,18 +10914,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Illegal Processing of Data" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Processing of Data" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578", + "@id": "_:N12b2c9394da44250a5ab771adc23fab8", "@type": [ "https://schema.org/WebPage" ], @@ -14251,10 +10941,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14265,12 +10979,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.44,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14280,7 +10989,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14292,34 +11001,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14327,7 +11025,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14339,32 +11037,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14374,7 +11078,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14386,21 +11090,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OrganisationDisruption", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14414,11 +11118,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14426,7 +11125,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14438,53 +11137,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Organisation Disruption" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Organisation Disruption" - } - ] - }, - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14494,7 +11178,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14506,21 +11190,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14534,9 +11218,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N796489c956df43e6941a9ff63835f450" + "@id": "_:N73922ea12cd34584b91e209f306167ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14546,7 +11236,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14558,37 +11248,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Copyright Violation" } ] }, { - "@id": "_:N796489c956df43e6941a9ff63835f450", + "@id": "_:N73922ea12cd34584b91e209f306167ae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14599,7 +11289,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14609,7 +11304,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14621,21 +11316,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14649,9 +11344,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14661,7 +11356,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14673,37 +11368,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14714,7 +11393,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N83bd5296b4d94804a73f0e0518c39495" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14724,7 +11414,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14736,32 +11426,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "_:N83bd5296b4d94804a73f0e0518c39495", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-06-12" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14771,7 +11483,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14783,20 +11495,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14808,7 +11520,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14818,7 +11530,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14830,21 +11542,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14870,10 +11582,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14885,13 +11597,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Very High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -14902,26 +11614,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14931,7 +11632,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14943,59 +11644,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15005,7 +11679,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15017,43 +11691,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15063,7 +11732,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15075,21 +11744,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15100,12 +11769,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.41,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15115,7 +11779,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15127,34 +11791,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15162,7 +11815,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15174,21 +11827,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationCodeConduct", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15202,9 +11861,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752" + "@id": "_:N9ba04625c759479eba79e0016163e8e6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15214,30 +11879,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Code of Conduct" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Code of Conduct" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752", + "@id": "_:N9ba04625c759479eba79e0016163e8e6", "@type": [ "https://schema.org/WebPage" ], @@ -15253,10 +11924,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15270,9 +11941,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.06,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbb93cef662444084828d04948d35895d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15282,7 +11959,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15294,37 +11971,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "_:Nbb93cef662444084828d04948d35895d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15334,7 +12028,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15346,18 +12040,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15376,7 +12070,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15386,7 +12080,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15398,21 +12092,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossProprietaryInformation", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15426,9 +12120,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N991585ef26bb47108970a62346663fd8" + "@id": "_:N0d138f94265e46f293490fbe0fc8074c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15438,7 +12138,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15450,18 +12150,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Proprietary Information" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Proprietary Information" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:N991585ef26bb47108970a62346663fd8", + "@id": "_:N0d138f94265e46f293490fbe0fc8074c", "@type": [ "https://schema.org/WebPage" ], @@ -15477,10 +12177,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RetrievalDiscardedEquipment", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15494,9 +12194,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15506,7 +12206,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15518,36 +12218,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Retrieval of Discarded Equipment" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ] - }, - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -15562,9 +12246,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15574,7 +12264,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Impact" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15586,72 +12279,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.22,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@value": "Impact to Rights" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "accepted" + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } + ] + }, + { + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -15663,12 +12326,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15678,13 +12347,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15696,26 +12359,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Unauthorised Data Access" } + ] + }, + { + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -15730,9 +12403,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7f1dc230141c4448a99f28f362191020" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15742,7 +12421,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15754,37 +12433,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "_:N7f1dc230141c4448a99f28f362191020", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.18,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15794,7 +12485,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15806,37 +12497,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15844,11 +12534,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15858,18 +12543,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -15893,7 +12588,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15905,37 +12600,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15945,7 +12629,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15957,18 +12641,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15987,7 +12671,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15997,7 +12681,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16009,57 +12693,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16067,11 +12725,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16081,21 +12734,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16109,9 +12767,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50" + "@id": "_:N0282f3114f5b4278b632620b9b954c7d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16121,7 +12785,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16133,18 +12797,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50", + "@id": "_:N0282f3114f5b4278b632620b9b954c7d", "@type": [ "https://schema.org/WebPage" ], @@ -16160,16 +12824,25 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16177,11 +12850,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16191,38 +12859,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "has threat source" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/rangeIncludes": [ { - "@value": "0.99,xsd:decimal" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16231,7 +12893,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16243,37 +12905,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16283,7 +12934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16295,20 +12946,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16320,12 +12971,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16335,7 +12992,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16347,27 +13004,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16381,9 +13054,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16393,7 +13072,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16405,20 +13084,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16430,12 +13125,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16445,7 +13140,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16457,20 +13152,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Extremely High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DangertoCustomers", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16485,9 +13186,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N18831f0e8999465a8606d764cedbf772" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16497,7 +13198,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16509,37 +13210,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Customers" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Customers" - } - ] - }, - { - "@id": "_:N18831f0e8999465a8606d764cedbf772", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16560,7 +13245,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16572,34 +13257,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EconomicDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16607,7 +13281,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16619,18 +13293,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16647,6 +13321,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.40,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16654,7 +13333,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16666,22 +13345,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -16695,7 +13380,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16707,21 +13392,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16732,12 +13417,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16747,13 +13438,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16765,32 +13450,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Unauthorised Access to Premises" } + ] + }, + { + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16800,33 +13512,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16840,9 +13574,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc" + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16852,7 +13592,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16864,18 +13604,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc", + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", "@type": [ "https://schema.org/WebPage" ], @@ -16891,7 +13631,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16910,7 +13650,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16932,21 +13672,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16960,9 +13700,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16972,7 +13712,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16984,36 +13724,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17024,12 +13749,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b3cb59e522845058c138349bfaee11f" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17039,7 +13759,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17051,34 +13771,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "_:N2b3cb59e522845058c138349bfaee11f", + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "IEC 31010:2019" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -17114,20 +13848,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17142,9 +13876,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17154,7 +13888,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17166,34 +13900,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ] - }, - { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -17212,7 +13930,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17234,21 +13952,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17259,7 +13977,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17269,7 +13987,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17281,21 +13999,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetrimentToRecovery", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17306,12 +14024,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne6d29cc562794702b681b9554016eecb" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17321,7 +14039,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17333,58 +14054,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Detriment to Recovery" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment to Recovery" - } - ] - }, - { - "@id": "_:Ne6d29cc562794702b681b9554016eecb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Very High Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17396,38 +14111,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LossResources", - "@type": [ - "https://w3id.org/dpv/owl#Risk", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "refers to risk" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/owl#Incident" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/rangeIncludes": [ { - "@id": "_:N6f190351ee794fc7bea72163952a80c9" + "@id": "https://w3id.org/dpv/owl#Risk" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17436,7 +14145,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17445,39 +14154,17 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Resources" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Resources" - } - ] - }, - { - "@id": "_:N6f190351ee794fc7bea72163952a80c9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17492,9 +14179,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17504,7 +14197,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17516,21 +14209,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17541,12 +14256,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17556,10 +14271,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17571,43 +14283,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.37,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17617,7 +14313,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17629,20 +14325,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17654,12 +14350,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17669,7 +14360,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17681,21 +14372,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17706,12 +14397,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17721,7 +14412,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17733,20 +14424,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vandalism", + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17758,12 +14455,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N876c898e81374a399d04313b0a0abd5c" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17773,7 +14465,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17785,37 +14477,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vandalism" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vandalism" - } - ] - }, - { - "@id": "_:N876c898e81374a399d04313b0a0abd5c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BusinessImpact", + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17826,12 +14502,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9088c785a56f4f7fa048660465c7540e" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17841,7 +14512,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17853,37 +14524,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business impact" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business impact" - } - ] - }, - { - "@id": "_:N9088c785a56f4f7fa048660465c7540e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossTrust", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17897,9 +14552,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N581201da4fd547aea094261f8d92243c" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17909,7 +14564,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17921,37 +14576,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Trust" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Trust" - } - ] - }, - { - "@id": "_:N581201da4fd547aea094261f8d92243c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17967,7 +14606,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17977,7 +14616,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17989,21 +14628,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18014,12 +14653,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N787d49d55a21419a871a50a966b25089" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18029,7 +14663,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18041,37 +14675,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Injury" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:N787d49d55a21419a871a50a966b25089", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#TheftEquipment", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18085,9 +14703,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nee206c8da189455dba93fd20501581cb" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18097,7 +14715,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18109,42 +14727,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "_:Nee206c8da189455dba93fd20501581cb", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18154,7 +14767,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18166,21 +14779,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LossFunds", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18191,12 +14804,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N853be36f6ea645d181836e5c35b74b46" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18206,7 +14819,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18218,37 +14837,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Funds" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Funds" - } - ] - }, - { - "@id": "_:N853be36f6ea645d181836e5c35b74b46", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "High Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18259,12 +14868,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18274,7 +14878,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18286,37 +14890,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostBackup", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18330,9 +14918,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e" + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18342,30 +14936,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Backup" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Backup" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e", + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", "@type": [ "https://schema.org/WebPage" ], @@ -18381,10 +14981,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18395,7 +14995,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18405,7 +15010,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18417,28 +15022,22 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -18452,7 +15051,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18464,39 +15063,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.60,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18504,7 +15087,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18516,21 +15099,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#KnownVulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18541,12 +15124,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N929457e20b914d3ca2b32435a60cb142" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18556,7 +15139,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18568,37 +15154,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" - } - ] - }, - { - "@id": "_:N929457e20b914d3ca2b32435a60cb142", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Very High Likelihood" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18609,7 +15185,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18619,7 +15201,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18631,26 +15213,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18660,7 +15260,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18672,21 +15272,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18700,9 +15300,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18712,7 +15312,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18724,37 +15324,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndustrialCrisis", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18768,9 +15352,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na943aaebcd6b4587862424ae0d880839" + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18780,7 +15370,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18792,48 +15382,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Malware Attack" } ] }, { - "@id": "_:Na943aaebcd6b4587862424ae0d880839", + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18843,7 +15438,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18855,21 +15450,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Reward provided as compensation (as an impact)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialRepairCosts", + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18880,12 +15475,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18895,7 +15485,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18907,53 +15497,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Repair Costs" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Repair Costs" - } - ] - }, - { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4b03b00cf447447bb996b08636f08431" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18963,7 +15527,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18975,37 +15539,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:N4b03b00cf447447bb996b08636f08431", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19019,9 +15567,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.02,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7beef942706b41468112e467b91c5f39" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19031,7 +15585,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19043,21 +15597,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Malicious Code Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "_:N7beef942706b41468112e467b91c5f39", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19071,9 +15641,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff" + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19083,7 +15659,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19095,37 +15671,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff", + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19141,7 +15717,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19163,32 +15739,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19198,7 +15779,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19210,18 +15791,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19240,7 +15821,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19250,7 +15831,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19262,21 +15843,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spying", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19290,9 +15871,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993" + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19302,7 +15889,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19314,37 +15901,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spying" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spying" + "@value": "Human Errors" } ] }, { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993", + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19355,12 +15942,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19370,7 +15957,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19382,27 +15969,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19418,7 +15999,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19428,48 +16009,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19481,42 +16021,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.31,xsd:decimal" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19526,7 +16055,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19538,31 +16067,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19572,7 +16107,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19584,21 +16119,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncreaseInternalCost", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19612,9 +16147,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19624,7 +16159,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19636,37 +16171,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Increase Internal Cost" - } - ] - }, - { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19680,9 +16199,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19692,7 +16211,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19704,37 +16223,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fraud" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" - } - ] - }, - { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19748,9 +16251,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35" + "@id": "_:Nf877665a169e4a7eac29964fc15db245" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19760,7 +16269,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19772,18 +16281,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35", + "@id": "_:Nf877665a169e4a7eac29964fc15db245", "@type": [ "https://schema.org/WebPage" ], @@ -19799,21 +16308,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PreventExercisingOfRights", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19823,7 +16332,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19835,39 +16344,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -19875,7 +16368,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19887,21 +16380,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19917,7 +16410,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.73,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19939,20 +16432,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spam", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -19967,9 +16460,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74" + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19979,7 +16478,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19991,37 +16490,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spam" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spam" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74", + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolationContractualObligations", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20035,9 +16534,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N615266688f80421fb6568a1b19a929d0" + "@id": "_:N8193907d23bd43dc8b146573989b8a0d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20047,7 +16552,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20059,37 +16564,78 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Contractual Obligations" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligations" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:N615266688f80421fb6568a1b19a929d0", + "@id": "_:N8193907d23bd43dc8b146573989b8a0d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Documented information about an incident, its handling, assessments,and notifications" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Report" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20103,9 +16649,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2" + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20115,7 +16667,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20127,37 +16679,84 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2", + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident caused due to environmental factors outside human controls" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CostAcquisition", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20171,9 +16770,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354" + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20183,7 +16788,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20195,18 +16800,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Acquisition" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Acquisition" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354", + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", "@type": [ "https://schema.org/WebPage" ], @@ -20222,9 +16827,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AttackonPrivateLife", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -20236,12 +16841,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N080033b8d0c44467ad532c1c7579376c" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20251,7 +16856,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20263,79 +16868,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Attack on Private Life" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Attack on Private Life" - } - ] - }, - { - "@id": "_:N080033b8d0c44467ad532c1c7579376c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Extremely High Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "accepted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20345,7 +16927,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20357,21 +16939,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20382,12 +16964,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20397,7 +16980,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20409,37 +16992,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" - } - ] - }, - { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20453,9 +17026,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20465,7 +17038,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20477,34 +17050,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -20545,37 +17138,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20585,7 +17167,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20597,36 +17179,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DangertoPersonnel", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -20641,9 +17207,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6175971113014283a5d3202f299a2a09" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20653,7 +17219,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20665,53 +17231,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Personnel" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Personnel" - } - ] - }, - { - "@id": "_:N6175971113014283a5d3202f299a2a09", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ThirdPartyOperationDisruption", + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Risk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N213543eccf8b457d9b7afa4825722eef" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20721,7 +17260,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Detriment" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20733,36 +17272,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Third Party Operation Disruption" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Third Party Operation Disruption" - } - ] - }, - { - "@id": "_:N213543eccf8b457d9b7afa4825722eef", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CorruptionData", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ - "https://w3id.org/dpv/owl#Risk", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -20777,9 +17300,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20789,7 +17312,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Damage" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20801,54 +17324,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Corruption of Data" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Corruption of Data" - } - ] - }, - { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Impact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-06-11" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "DGA 2.10" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20858,7 +17365,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20870,18 +17377,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fee provided as compensation (as an impact)" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -20899,7 +17406,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20911,44 +17418,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@value": "0.86,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] } diff --git a/2.1-dev/risk/risk-owl.n3 b/2.1-dev/risk/risk-owl.n3 index a1c235ecf..f2342f89c 100644 --- a/2.1-dev/risk/risk-owl.n3 +++ b/2.1-dev/risk/risk-owl.n3 @@ -115,20 +115,6 @@ risk-owl:7SeverityLevels a rdfs:Class, skos:definition "Scale with 7 Severity Levels from Extremely High to Extremely Low"@en ; skos:prefLabel "7 Severity Levels"@en . -risk-owl:AbusiveContentUtilisation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Abusive Content Utilisation"@en ; - skos:prefLabel "Abusive Content Utilisation"@en . - risk-owl:AccidentalIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -138,34 +124,37 @@ risk-owl:AccidentalIncident a rdfs:Class, skos:definition "Incident caused due to accidental actions arising from human or human-controlled situations"@en ; skos:prefLabel "Accidental Incident"@en . -risk-owl:AttackonPrivateLife a rdfs:Class, +risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Attack on Private Life"@en ; - skos:prefLabel "Attack on Private Life"@en . + skos:definition "Accidental Misuse"@en ; + skos:prefLabel "Accidental Misuse"@en . risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Authorisation Failure"@en ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . +risk-owl:AvailabilityBreach a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + risk-owl:AvailabilityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -188,85 +177,46 @@ risk-owl:AvoidSource a rdfs:Class, risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Blackmail"@en ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Brute Force Authorisations"@en ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . -risk-owl:BusinessImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Business impact"@en ; - skos:prefLabel "Business impact"@en . - -risk-owl:BusinessPerformanceImpairment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business Performance Impairment"@en ; - skos:prefLabel "Business Performance Impairment"@en . - -risk-owl:Businessdisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business disruption"@en ; - skos:prefLabel "Business disruption"@en . - risk-owl:ChangeConsequence a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -289,127 +239,96 @@ risk-owl:ChangeImpact a rdfs:Class, skos:definition "Control that changes Impact"@en ; skos:prefLabel "Change Impact"@en . -risk-owl:ChildViolence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Child Violence"@en ; - skos:prefLabel "Child Violence"@en . - -risk-owl:CitizensImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Citizens impact"@en ; - skos:prefLabel "Citizens impact"@en . - risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Coercion"@en ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Benefit ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . -risk-owl:ComplianceImpact a rdfs:Class, +risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compliance impact"@en ; - skos:prefLabel "Compliance impact"@en . + skos:definition "Something that acts as or causes Component Failure"@en ; + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccount a rdfs:Class, +risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account"@en ; - skos:prefLabel "Compromise Account"@en . + skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccountCredentials a rdfs:Class, +risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Credentials"@en ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:prefLabel "Compromise Account"@en . -risk-owl:CompromiseAccountSecurity a rdfs:Class, +risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Security"@en ; - skos:prefLabel "Compromise Account Security"@en . + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Confidentiality Breach"@en ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . risk-owl:ConfidentialityIncident a rdfs:Class, @@ -432,28 +351,6 @@ risk-owl:ConsequenceControl a rdfs:Class, skos:definition "Risk Mitigation Measure that controls the Consequences"@en ; skos:prefLabel "Consequence Control"@en . -risk-owl:ConsequenceForDataSubject a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence for Data Subject"@en ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk-owl:ConsequenceOnDataSecurity a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence on Data Security"@en ; - skos:prefLabel "Consequence on Data Security"@en . - risk-owl:ContainmentControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -466,144 +363,19 @@ risk-owl:ContainmentControl a rdfs:Class, risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Copyright Violation"@en ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . -risk-owl:CorruptionData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Corruption of Data"@en ; - skos:prefLabel "Corruption of Data"@en . - -risk-owl:CostAcquisition a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Acquisition"@en ; - skos:prefLabel "Cost of Acquisition"@en . - -risk-owl:CostBackup a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Backup"@en ; - skos:prefLabel "Cost of Backup"@en . - -risk-owl:CostConfiguration a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Configuration"@en ; - skos:prefLabel "Cost of Configuration"@en . - -risk-owl:CostInstallation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Installation"@en ; - skos:prefLabel "Cost of Installation"@en . - -risk-owl:CostJudicialPenalties a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk-owl:CostJudicialProceedings a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk-owl:CostOperationInterruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Operation Interruption"@en ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk-owl:CostSuspendedOperations a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Suspended Operations"@en ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk-owl:CrossBorderIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -615,114 +387,63 @@ risk-owl:CrossBorderIncident a rdfs:Class, risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . -risk-owl:CyberSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Spying"@en ; - skos:prefLabel "Cyber Spying"@en . - -risk-owl:CyberStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Stalking"@en ; - skos:prefLabel "Cyber Stalking"@en . - risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . -risk-owl:DamageByThirdParty a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Damage by Third Party"@en ; - skos:prefLabel "Damage by Third Party"@en . - -risk-owl:DangertoCustomers a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Danger to Customers"@en ; - skos:prefLabel "Danger to Customers"@en . - -risk-owl:DangertoPersonnel a rdfs:Class, +risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex-owl:E0069, + dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Danger to Personnel"@en ; - skos:prefLabel "Danger to Personnel"@en . + skos:definition "Something that acts as or causes Data Breach"@en ; + skos:prefLabel "Data Breach"@en . -risk-owl:DataBreach a rdfs:Class, +risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex-owl:E0069, - dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Data Breach"@en ; - skos:prefLabel "Data Breach"@en . + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk-owl:DeliberateIncident a rdfs:Class, owl:Class ; @@ -735,16 +456,20 @@ risk-owl:DeliberateIncident a rdfs:Class, risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:DetectionControl a rdfs:Class, @@ -759,79 +484,43 @@ risk-owl:DetectionControl a rdfs:Class, risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . -risk-owl:DetrimentToRecovery a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Detriment to Recovery"@en ; - skos:prefLabel "Detriment to Recovery"@en . - risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Discrimination"@en ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk-owl:Eavesdropping a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Eavesdropping"@en ; - skos:prefLabel "Eavesdropping"@en . - -risk-owl:EconomicDisadvantage a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Economic Disadvantage"@en ; - skos:prefLabel "Economic Disadvantage"@en . - risk-owl:EnvironmentalIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -841,74 +530,100 @@ risk-owl:EnvironmentalIncident a rdfs:Class, skos:definition "Incident caused due to environmental factors outside human controls"@en ; skos:prefLabel "Environmental Incident"@en . -risk-owl:EnvironmentalSafetyEndangerment a rdfs:Class, +risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Environmental Safety Endangerment"@en ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; + skos:prefLabel "Environmental Risk"@en . risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Equipment Failure"@en ; - skos:prefLabel "Equipment Failure"@en . + skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Equipment Malfunction"@en ; - skos:prefLabel "Equipment Malfunction"@en . + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Erroneous System Use"@en ; + skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:prefLabel "Erroneous System Use"@en . +risk-owl:ExposureToHarmfulSpeech a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk-owl:ExternalSecurityThreat a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:prefLabel "External Security Threat"@en . + risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Extorsion"@en ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:ExtremelyHighLikelihood a rdfs:Class, @@ -991,114 +706,56 @@ risk-owl:ExtremelyLowSeverity a rdfs:Class, risk-owl:Fee a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; - sw:term_status "accepted"@en ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + rdfs:subClassOf risk-owl:FinancialImpact ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:prefLabel "Fee"@en . -risk-owl:FinancialEquipmentCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Equipment Costs"@en ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk-owl:FinancialInvestigationCosts a rdfs:Class, +risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Financial Investigation Costs"@en ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:definition "Things that cause or have the potential to impact financial resources"@en ; + skos:prefLabel "Financial Impact"@en . risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Financial Loss"@en ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . -risk-owl:FinancialPersonnelCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Personnel Costs"@en ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk-owl:FinancialRepairCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Repair Costs"@en ; - skos:prefLabel "Financial Repair Costs"@en . - risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Fraud"@en ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . -risk-owl:GovernmentCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Government Crisis"@en ; - skos:prefLabel "Government Crisis"@en . - risk-owl:HaltSource a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -1112,42 +769,16 @@ risk-owl:HaltSource a rdfs:Class, risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes harms"@en ; - skos:prefLabel "Harm"@en . - -risk-owl:HarmfulSpeech a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Harmful Speech"@en ; - skos:prefLabel "Harmful Speech"@en . - -risk-owl:HealthLifeImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Health and life impact"@en ; - skos:prefLabel "Health and life impact"@en . + skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk-owl:HighLikelihood a rdfs:Class, owl:Class, @@ -1196,16 +827,17 @@ risk-owl:HighSeverity a rdfs:Class, risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Human Errors"@en ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:prefLabel "Human Errors"@en . risk-owl:IdentificationControl a rdfs:Class, @@ -1218,58 +850,51 @@ risk-owl:IdentificationControl a rdfs:Class, skos:definition "Control to identify characteristics of event"@en ; skos:prefLabel "Identification Control"@en . -risk-owl:IdentityDispute a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Identity Dispute"@en ; - skos:prefLabel "Identity Dispute"@en . - risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Fraud"@en ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Theft"@en ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . -risk-owl:IllegalProcessingData a rdfs:Class, +risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Illegal Processing of Data"@en ; - skos:prefLabel "Illegal Processing of Data"@en . + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . risk-owl:ImpactControl a rdfs:Class, owl:Class, @@ -1282,40 +907,17 @@ risk-owl:ImpactControl a rdfs:Class, skos:definition "Risk Mitigation Measure that controls Impacts"@en ; skos:prefLabel "Impact Control"@en . -risk-owl:ImpactOnDataSubject a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact on Data Subject"@en ; - skos:prefLabel "Impact on Data Subject"@en . - -risk-owl:ImpactToRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en . - risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date, "2024-05-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex-owl:E0069, dex-owl:E0070 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf rdfs:Class, + dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "An actual or occured event"@en ; skos:prefLabel "Incident"@en ; @@ -1539,48 +1141,43 @@ risk-owl:IncidentTerminated a rdfs:Class, skos:definition "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring"@en ; skos:prefLabel "Incident Terminated"@en . -risk-owl:IncreaseInternalCost a rdfs:Class, +risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Increase Internal Cost"@en ; - skos:prefLabel "Increase Internal Cost"@en . + skos:prefLabel "Individual Health & Safety"@en . -risk-owl:IndustrialCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk-owl:IndividualRisk a rdfs:Class, + owl:Class ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; sw:term_status "accepted"@en ; - skos:definition "Industrial Crisis"@en ; - skos:prefLabel "Industrial Crisis"@en . + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; + skos:prefLabel "Individual Risk"@en . risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Injury"@en ; + skos:definition "Something that acts as or causes Injury"@en ; skos:prefLabel "Injury"@en . +risk-owl:IntegrityBreach a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + risk-owl:IntegrityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -1590,321 +1187,171 @@ risk-owl:IntegrityIncident a rdfs:Class, skos:definition "Incident where the integrity of information or system has been affected"@en ; skos:prefLabel "Integrity Incident"@en . -risk-owl:InterceptionCommunications a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Interception of Communications"@en ; - skos:prefLabel "Interception of Communications"@en . - -risk-owl:InternalOperationDisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Internal Operation Disruption"@en ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk-owl:KnownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk-owl:LawEnforcementAdverseEffects a rdfs:Class, +risk-owl:IntentionalMisuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . - -risk-owl:LimitationOfRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Limitation of Rights"@en ; - skos:prefLabel "Limitation of Rights"@en . + skos:definition "Intentional Misuse"@en ; + skos:prefLabel "Intentional Misuse"@en . -risk-owl:LossAssets a rdfs:Class, +risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Assets"@en ; - skos:prefLabel "Loss of Assets"@en . - -risk-owl:LossCompetitiveAdvantage a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:prefLabel "Loss of Competitive Advantage"@en . + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:LossControlOverData a rdfs:Class, +risk-owl:InternalSecurityThreat a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Control over Data"@en ; - skos:prefLabel "Loss of Control over Data"@en . + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; + skos:prefLabel "Internal Security Threat"@en . -risk-owl:LossCredibility a rdfs:Class, +risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Credibility"@en ; - skos:prefLabel "Loss of Credibility"@en . - -risk-owl:LossCustomerConfidence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Customer Confidence"@en ; - skos:prefLabel "Loss of Customer Confidence"@en . - -risk-owl:LossCustomers a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Customers"@en ; - skos:prefLabel "Loss of Customers"@en . - -risk-owl:LossData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Data"@en ; - skos:prefLabel "Loss of Data"@en . - -risk-owl:LossFunds a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Funds"@en ; - skos:prefLabel "Loss of Funds"@en . - -risk-owl:LossGoods a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Goods"@en ; - skos:prefLabel "Loss of Goods"@en . - -risk-owl:LossGoodwill a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Loss of Goodwill"@en ; - skos:prefLabel "Loss of Goodwill"@en . + skos:definition "Something that involves or causes judicial costs to be paid"@en ; + skos:prefLabel "Judicial Costs"@en . -risk-owl:LossNegotiatingCapacity a rdfs:Class, +risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:FinancialImpact ; + sw:term_status "accepted"@en ; + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; + skos:prefLabel "Judicial Penalty"@en . + +risk-owl:LegalRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Negotiating Capacity"@en ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:prefLabel "Legal Risk"@en . -risk-owl:LossOpportunity a rdfs:Class, +risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Opportunity"@en ; - skos:prefLabel "Loss of Opportunity"@en . + skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:prefLabel "Lose of Credibility"@en . -risk-owl:LossProprietaryInformation a rdfs:Class, +risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Proprietary Information"@en ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:prefLabel "Lose of Customer Confidence"@en . -risk-owl:LossReputation a rdfs:Class, +risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Reputation"@en ; - skos:prefLabel "Loss of Reputation"@en . + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:prefLabel "Lose of Goodwill"@en . -risk-owl:LossResources a rdfs:Class, +risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Resources"@en ; - skos:prefLabel "Loss of Resources"@en . + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk-owl:LossSuppliers a rdfs:Class, +risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Suppliers"@en ; - skos:prefLabel "Loss of Suppliers"@en . + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:prefLabel "Lose of Opportunity"@en . -risk-owl:LossTechnologicalAdvantage a rdfs:Class, +risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Technological Advantage"@en ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:prefLabel "Lose of Reputation"@en . -risk-owl:LossTrust a rdfs:Class, +risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Trust"@en ; - skos:prefLabel "Loss of Trust"@en . + skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:prefLabel "Lose of Trust"@en . risk-owl:LowLikelihood a rdfs:Class, owl:Class, @@ -1953,82 +1400,59 @@ risk-owl:LowSeverity a rdfs:Class, risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:prefLabel "Material Damage"@en . - -risk-owl:MisinformationDisinformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:definition "Something that acts as or causes Material Damage"@en ; + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Misuse"@en ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:prefLabel "Misuse"@en . -risk-owl:MisuseBreachedInformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Misuse of Breached Information"@en ; - skos:prefLabel "Misuse of Breached Information"@en . - risk-owl:ModerateLikelihood a rdfs:Class, owl:Class, dpv-owl:Likelihood ; @@ -2154,175 +1578,127 @@ risk-owl:MonitorVulnerabilities a rdfs:Class, risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes non-material damages"@en ; - skos:prefLabel "Non-Material Damage"@en . + skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk-owl:OrganisationDisruption a rdfs:Class, +risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Organisation Disruption"@en ; - skos:prefLabel "Organisation Disruption"@en . + skos:definition "Risks and issues that arise during operational processes"@en ; + skos:prefLabel "Operational Security Risk"@en . risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Personal Safety Endangerment"@en ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . -risk-owl:PersonnelAbsence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Personnel Absence"@en ; - skos:prefLabel "Personnel Absence"@en . - risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Physical Assault"@en ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . -risk-owl:PhysicalSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Spying"@en ; - skos:prefLabel "Physical Spying"@en . - -risk-owl:PhysicalStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Stalking"@en ; - skos:prefLabel "Physical Stalking"@en . - -risk-owl:PreventExercisingOfRights a rdfs:Class, +risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Prevent Exercising of Rights"@en ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk-owl:PrivacyImpact a rdfs:Class, +risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Privacy impact"@en ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Psychological Harm"@en ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Public Order Breach"@en ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . risk-owl:RM3x3S1L1 a rdfs:Class, @@ -3321,23 +2697,6 @@ risk-owl:RM7x7S7L7 a rdfs:Class, skos:definition "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High"@en ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . -risk-owl:RansomwareAttack a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:prefLabel "Ransomware Attack"@en . - risk-owl:RecoveryControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -3382,14 +2741,16 @@ risk-owl:ReductionControl a rdfs:Class, risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Re-identification"@en ; - skos:prefLabel "Re-identification"@en . + skos:definition "Something that acts as or causes Re-identification"@en ; + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . risk-owl:RemedyControl a rdfs:Class, owl:Class, @@ -3401,20 +2762,6 @@ risk-owl:RemedyControl a rdfs:Class, skos:definition "Control to remedy consequences of event"@en ; skos:prefLabel "Remedy Control"@en . -risk-owl:RemoteSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Remote Spying"@en ; - skos:prefLabel "Remote Spying"@en . - risk-owl:RemoveConsequence a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -3450,81 +2797,92 @@ risk-owl:RemoveSource a rdfs:Class, risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:prefLabel "Remuneration"@en . -risk-owl:ReplacementCosts a rdfs:Class, +risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; + skos:prefLabel "Reputational Risk"@en . + +risk-owl:Reward a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Replacement Costs"@en ; - skos:prefLabel "Replacement Costs"@en . + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; + skos:prefLabel "Reward"@en . -risk-owl:ReputationTrustImpact a rdfs:Class, +risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Reputation and trust impact"@en ; - skos:prefLabel "Reputation and trust impact"@en . + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk-owl:RetrievalDeletedData a rdfs:Class, +risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:Impact, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Deleted Data"@en ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk-owl:RetrievalDiscardedEquipment a rdfs:Class, +risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Discarded Equipment"@en ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . -risk-owl:Reward a rdfs:Class, +risk-owl:RightsViolation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Reward provided as compensation (as an impact)"@en ; - skos:prefLabel "Reward"@en . + skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk-owl:RiskAnalysis a rdfs:Class, owl:Class ; @@ -3619,80 +2977,80 @@ risk-owl:RiskMatrix7x7 a rdfs:Class, risk-owl:RiskSource a rdfs:Class, owl:Class ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:prefLabel "Risk Source"@en . risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Sabotage"@en ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Scam"@en ; + skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . -risk-owl:SecurityBreach a rdfs:Class, +risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Security Breach"@en ; - skos:prefLabel "Security Breach"@en . + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:prefLabel "Security Attack"@en . -risk-owl:ServiceInterruption a rdfs:Class, +risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Service Interruption"@en ; - skos:prefLabel "Service Interruption"@en . + skos:definition "Something that acts as or causes Security Breach"@en ; + skos:prefLabel "Security Breach"@en . risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Sexual Violence"@en ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:ShareRisk a rdfs:Class, @@ -3708,194 +3066,125 @@ risk-owl:ShareRisk a rdfs:Class, risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Social Disadvantage"@en ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . -risk-owl:SourceControl a rdfs:Class, +risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - risk-owl:RiskControl ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2024-05-19"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskControl ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Risk Mitigation Measure that controls the Source"@en ; - skos:prefLabel "Source Control"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk-owl:Spam a rdfs:Class, +risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Spam"@en ; - skos:prefLabel "Spam"@en . + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:prefLabel "Societal Risk"@en . -risk-owl:Spoofing a rdfs:Class, +risk-owl:SourceControl a rdfs:Class, owl:Class, - dpv-owl:Risk ; + risk-owl:RiskControl ; dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dct:created "2024-05-19"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:RiskControl ; sw:term_status "accepted"@en ; - skos:definition "Spoofing"@en ; - skos:prefLabel "Spoofing"@en . + skos:definition "Risk Mitigation Measure that controls the Source"@en ; + skos:prefLabel "Source Control"@en . -risk-owl:Spying a rdfs:Class, +risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Spying"@en ; - skos:prefLabel "Spying"@en . - -risk-owl:Stalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Stalking"@en ; - skos:prefLabel "Stalking"@en . + skos:definition "Something that acts as or causes Spoofing"@en ; + skos:prefLabel "Spoofing"@en . risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Failure"@en ; - skos:prefLabel "System Failure"@en . + skos:definition "Something that acts as or causes System Failure"@en ; + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "System Intrusion"@en ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Malfunction"@en ; - skos:prefLabel "System Malfunction"@en . + skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Terrorism"@en ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:prefLabel "Terrorism"@en . -risk-owl:Theft a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft"@en ; - skos:prefLabel "Theft"@en . - -risk-owl:TheftEquipment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Equipment"@en ; - skos:prefLabel "Theft of Equipment"@en . - -risk-owl:TheftMedia a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Media"@en ; - skos:prefLabel "Theft of Media"@en . - -risk-owl:ThirdPartyOperationDisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Third Party Operation Disruption"@en ; - skos:prefLabel "Third Party Operation Disruption"@en . - risk-owl:Threat a rdfs:Class, owl:Class ; dct:created "2024-02-14"^^xsd:date ; @@ -3916,252 +3205,243 @@ risk-owl:ThreatSource a rdfs:Class, risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Access to Premises"@en ; + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . +risk-owl:UnauthorisedActivity a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:prefLabel "Unauthorised Activity"@en . + risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . -risk-owl:UnauthorisedImpersonation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Unauthorised Impersonation"@en ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Reidentification ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Resource Use"@en ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Access"@en ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . -risk-owl:UnknownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Code Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Data Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk-owl:Vandalism a rdfs:Class, +risk-owl:UserRisks a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Vandalism"@en ; - skos:prefLabel "Vandalism"@en . + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; + skos:prefLabel "User Risks"@en . risk-owl:VeryHighLikelihood a rdfs:Class, owl:Class, @@ -4247,86 +3527,110 @@ risk-owl:VeryLowSeverity a rdfs:Class, skos:prefLabel "Very Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1"@en . -risk-owl:ViolationCodeConduct a rdfs:Class, +risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Code of Conduct"@en ; - skos:prefLabel "Violation of Code of Conduct"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk-owl:ViolationContractualObligations a rdfs:Class, +risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk-owl:ViolationEthicalCode a rdfs:Class, +risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Ethical Code"@en ; - skos:prefLabel "Violation of Ethical Code"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk-owl:ViolationOfRights a rdfs:Class, +risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . + +risk-owl:ViolatingPolicy a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Rights"@en ; - skos:prefLabel "Violation of Rights"@en . + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:prefLabel "Violating Policy"@en . -risk-owl:ViolationRegulatoryObligations a rdfs:Class, +risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Regulatory Obligations"@en ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk-owl:ViolationStatutoryObligations a rdfs:Class, +risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:definition "Something that acts as or causes Child Violence"@en ; + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk-owl:Vulnerability a rdfs:Class, owl:Class ; @@ -4339,32 +3643,19 @@ risk-owl:Vulnerability a rdfs:Class, risk-owl:VulnerabilityCreated a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:InternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Vulnerability Created"@en ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:prefLabel "Vulnerability Created"@en . -risk-owl:VulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Vulnerability Exploited"@en ; - skos:prefLabel "Vulnerability Exploited"@en . - risk-owl:causedByThreat a rdf:Property, owl:ObjectProperty ; dcam:rangeIncludes risk-owl:Threat ; diff --git a/2.1-dev/risk/risk-owl.rdf b/2.1-dev/risk/risk-owl.rdf index cf902597d..f2370943c 100644 --- a/2.1-dev/risk/risk-owl.rdf +++ b/2.1-dev/risk/risk-owl.rdf @@ -13,5382 +13,4415 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - - Julio Fernandez - Fajar Ekaputra - Rob Brennan - Harshvardhan J. Pandit - Axel Polleres - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Julian Flake - https://w3id.org/dpv/risk# - - - - - - - - - - http://purl.org/ontology/bibo/status/published - RISK - - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Rob Brennan - Paul Ryan - Julian Flake - Delaram Golpayegani - Georg P. Krog - Beatriz Esteves - Harshvardhan J. Pandit - 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2022-08-14 - - https://w3id.org/dpv/risk - 2.1-dev - risk - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 - 2024-07-13 - - - 2022-08-14 - Risk Concepts - - - - - - - accepted - Abusive Content Utilisation - Harshvardhan J. Pandit - 2022-08-17 + + Very High Risk + Level where Risk is Very High + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Abusive Content Utilisation - - - - 2022-10-22 - + 0.9,xsd:decimal + - Consequence for Data Subject - Consequence for Data Subject + Harshvardhan J. Pandit accepted - Harshvardhan J. Pandit, Georg P. Krog - - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + 2022-08-18 + + - - Unauthorised Data Modification - Unauthorised Data Modification - Harshvardhan J. Pandit + + - - 2022-08-17 + Reduction Control accepted - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + 2024-05-19 + Control that reduces the likelihood or severity of an event + - - + + - 0.48,xsd:decimal - High Risk (RM5x5 S:3 L:4) - Harshvardhan J. Pandit 2022-08-17 - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High accepted - - - - accepted - - - - Impact on Data Subject - Harshvardhan J. Pandit, Georg P. Krog - 2022-10-22 + 2024-08-16 + Something that acts as or causes Loss of Negotiating Capacity + + Harshvardhan J. Pandit - Impact on Data Subject - + Lose of Negotiating Capacity + - + - + + Georg P. Krog, Harshvardhan J. Pandit + Something that acts as or provides compensation - which can be monetary and financial or in other forms + 2024-08-16 + Compensation - - 2022-08-17 + 2024-04-14 accepted - Damage by Third Party - Damage by Third Party - Harshvardhan J. Pandit - + - - 0.1,xsd:decimal - + + - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - Level where Severity is Very Low - Very Low Severity Harshvardhan J. Pandit - - 2022-08-18 accepted - - + Risk Matrix 7x7 + + 2022-08-17 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + - - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - https://www.iso.org/standard/75281.html - + + + Harshvardhan J. Pandit - + - - Remedy Control - 2024-05-19 - Control to remedy consequences of event + 2024-02-14 + The status of a incident is unknown accepted - + Incident Status Unknown + - + + Violation of Rights - + - Harshvardhan J. Pandit - Unwanted Disclosure of Data - Unwanted Disclosure of Data - 2022-08-17 + Something that acts as or causes Violation of Rights - accepted - + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + 2024-08-16 + This concept was called "ViolationOfRights" in DPV 2.0 + - + + 0.5,xsd:decimal - + - - Harshvardhan J. Pandit - Business impact - Business impact - 2022-08-17 + Harshvardhan J. Pandit accepted - + Moderate Severity + Level where Severity is Moderate + 2022-08-18 + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + + - - accepted + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - Harshvardhan J. Pandit - Extremely Low Risk (RM7x7 S:2 L:2) - 0.08,xsd:decimal - 2022-08-17 + Very High Risk (RM7x7 S:6 L:4) - - - Harshvardhan J. Pandit - Identity Dispute - - - - 2022-08-24 - - Identity Dispute + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + 0.49,xsd:decimal + 2022-08-17 accepted - + - - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - + + + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + 2024-02-14 - - accepted - 2024-02-14 - + caused by vulnerability + - + + Harshvardhan J. Pandit + accepted + 2024-05-19 + Control that reduces the likelihood of an event + + + + Reduce Likelihood - 2022-08-17 - + + + + + Harshvardhan J. Pandit + accepted - - Financial Equipment Costs - Harshvardhan J. Pandit - Financial Equipment Costs - + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + High Severity + 2022-08-18 + 0.75,xsd:decimal + Level where Severity is High + + + - + + 3 Severity Levels Harshvardhan J. Pandit + 2022-08-18 + - - Detriment to Recovery + Scale with 3 Severity Levels from High to Low - Detriment to Recovery - 2022-08-17 - accepted - + - - Cost of Judicial Penalties + - 2022-08-17 - + Very Low Risk (RM7x7 S:6 L:1) + 0.12,xsd:decimal + accepted + - accepted - Cost of Judicial Penalties - Harshvardhan J. Pandit - + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + - - 2022-08-19 - Social Disadvantage - + + accepted + - Social Disadvantage - accepted - Georg P. Krog + 2022-08-17 + + Something that acts as or causes Unauthorised Code Modification + 2024-08-16 + Unauthorised Code Modification - + Harshvardhan J. Pandit + - + + Illegal Data Processing + 2024-08-16 + Something that acts as or causes Illegal Processing of Data + This concept was called "IllegalProcessingData" in DPV 2.0 Harshvardhan J. Pandit + accepted + - + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + 2022-08-17 - - accepted - Very Low Risk (RM7x7 S:5 L:1) - 0.10,xsd:decimal - + - + + Risk Mitigation Measure that controls Impacts + - - accepted - - Harshvardhan J. Pandit - 2022-08-17 - Personnel Absence - Personnel Absence - - - - - - + Impact Control Harshvardhan J. Pandit - - 2024-02-14 accepted - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - Incident Mitigated - + 2024-05-19 + - + + https://www.iso.org/standard/72140.html + IEC 31010:2019 + + + - + - accepted - Impact that acts as or causes non-material damages - Harshvardhan J. Pandit - Non-Material Damage + Remedy Control - 2022-03-30 - + Control to remedy consequences of event + accepted + 2024-05-19 + - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + Something that acts as or causes System Malfunction + 2024-08-16 + Here system refers to both hardware and software systems Harshvardhan J. Pandit + accepted + - + 2022-08-17 - accepted - Intentional use of software by including or inserting in a system for a harmful purpose - Malicious Code Attack - - + System Malfunction + - - 0.10,xsd:decimal + + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM7x7 S:5 L:4) + + 0.41,xsd:decimal Harshvardhan J. Pandit - Very Low Risk (RM7x7 S:1 L:5) - 2022-08-17 - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + 2022-08-17 - - - Harshvardhan J. Pandit - 2022-08-17 - - Data Breach - accepted - + + 2024-08-16 + - Data Breach - - - - - - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + modified + + Harshvardhan J. Pandit + 2022-08-17 + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + + + + Extremely High Risk (RM7x7 S:6 L:7) accepted - + - 0.24,xsd:decimal Harshvardhan J. Pandit + 2022-08-17 + 0.86,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - + + + + + Level where Likelihood is Extremely Low + Extremely Low Likelihood + 2022-08-18 - 2024-05-19 - + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Harshvardhan J. Pandit accepted + + + + - An impact assessment associated with a incident Harshvardhan J. Pandit - Incident Impact Assessment - - + + + Spoofing 2022-08-17 + Something that acts as or causes Spoofing accepted - + 2024-08-16 + + + + + + accepted + 2024-05-19 + Control that removes the risk source + Remove Source + Harshvardhan J. Pandit - - Violation of Regulatory Obligations - Violation of Regulatory Obligations - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - - Incident where the confidentiality of information or system has been affected - Confidentiality Incident - 2024-05-19 - - - - accepted - - - Consequence Control + + Incident Suspected accepted - 2024-05-19 - Risk Mitigation Measure that controls the Consequences + - Harshvardhan J. Pandit - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - - Primer for Data Privacy Vocabulary - - - - - + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + 2024-02-14 + - - Control to detect event + + + + Incident Concluding Report - - - 2024-05-19 - Detection Control accepted - + 2024-05-19 + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - Harshvardhan J. Pandit + + - - 0.9,xsd:decimal - 2022-08-18 + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Code Disclosure + 2022-08-17 + + Unauthorised Code Disclosure - Level where Severity is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2024-08-16 accepted - Very High Severity - - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - Denial of Service Attack (DoS) - - - + accepted - - Harshvardhan J. Pandit - 2022-08-17 - - Denial of Service Attack (DoS) - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - Harshvardhan J. Pandit - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - + Risk Mitigation Measure that controls the Source 2024-05-19 - accepted + Source Control + + Harshvardhan J. Pandit - + + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + 0.08,xsd:decimal - 0.20,xsd:decimal Harshvardhan J. Pandit - 2022-08-17 - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low accepted - Low Risk (RM7x7 S:5 L:2) - + Very Low Risk (RM5x5 S:2 L:1) + + - - Harshvardhan J. Pandit + + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + 2022-08-17 + Very Low Risk (RM7x7 S:2 L:3) + - - 2022-08-17 - Government Crisis - Government Crisis - - accepted - + Harshvardhan J. Pandit + 0.12,xsd:decimal + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + + accepted + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + + + 2024-02-14 + Incident Mitigated + Harshvardhan J. Pandit + - + - + - Level where Likelihood is Very High - Very High Likelihood - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Moderate Risk (RM7x7 S:7 L:2) accepted - 2022-08-18 - 0.9,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate Harshvardhan J. Pandit - - + 2022-08-17 + 0.29,xsd:decimal + - - 0.01,xsd:decimal - - - - Extremely Low Likelihood - 2022-08-18 + Harshvardhan J. Pandit - - Level where Likelihood is Extremely Low - accepted - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - - - accepted + 2022-08-17 - + - Harshvardhan J. Pandit - - 2022-08-17 + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - Public Order Breach - Public Order Breach - + 0.60,xsd:decimal + - - 2022-08-17 + + 2024-08-16 + Something that acts as or causes Unauthorised Access to Premises + - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - - - accepted - 0.43,xsd:decimal - Very High Risk (RM7x7 S:3 L:7) - Harshvardhan J. Pandit - - - - - - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - 2022-08-18 Harshvardhan J. Pandit + accepted + 2022-08-17 + Unauthorised Access to Premises + - - accepted - Risk Analysis - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - + + Delaram Golpayegani + 2024-08-16 + Misuse + - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + Something that acts as or causes Misuse - Risk Source accepted - 2024-02-14 - + 2024-06-11 + - - Harshvardhan J. Pandit - 2022-08-17 - - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + accepted - 0.12,xsd:decimal - + - + 2024-06-12 + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + Risk Management + ISO 31073:2022 Risk management vocabulary + - - + + - accepted - Harshvardhan J. Pandit + accepted 2022-08-17 + 0.04,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:1) - Brute Force Authorisations - Brute Force Authorisations - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + - + + + Lose of Customer Confidence + accepted 2022-08-17 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + Something that acts as or causes Loss of Customer Confidence + - accepted - Risk Matrix 7x7 Harshvardhan J. Pandit - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + 2024-08-16 + - - Incident Terminated + + Something that acts as or causes Identity Theft Harshvardhan J. Pandit - - 2024-02-14 - + Identity Theft + accepted + - accepted - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - + + + 2024-08-16 + 2022-08-17 + - - 2022-08-18 + + Harshvardhan J. Pandit + 2024-08-16 + 2022-08-17 + This concept was called "ChildViolence" in DPV 2.0 + + - - Level where Risk is Moderate - Moderate Risk + Violence against children - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Something that acts as or causes Child Violence accepted - 0.5,xsd:decimal - Harshvardhan J. Pandit - - - + - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 2022-08-17 - accepted + + + Very Low Risk (RM5x5 S:1 L:3) - 0.44,xsd:decimal Harshvardhan J. Pandit - Moderate Risk (RM3x3 S:2 L:2) - - + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + 2022-08-17 + 0.12,xsd:decimal + - - 2022-08-18 - 3 Likelihood Levels + + Low Risk (RM7x7 S:4 L:2) + accepted - + - Scale with 3 Likelihood Levels from High to Low - - accepted Harshvardhan J. Pandit - + + 0.16,xsd:decimal + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + - + - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - 2022-08-17 + + 2024-02-14 + has control + + Indicates the use of specified control + + accepted + + + + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High 0.99,xsd:decimal - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - Harshvardhan J. Pandit - - - - - - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - Incident Concluding Report accepted - 2024-05-19 - - - - - - Very High Risk (RM7x7 S:6 L:5) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High 2022-08-17 - - 0.61,xsd:decimal - accepted + Extremely High Risk (RM7x7 S:7 L:7) - + + accepted + Indicates an incident is associated with the specified context - accepted - - Indicates the associated context (subject) has indicated vulnerability (object) - has vulnerability - + + has incident + 2024-02-14 - - + + Harshvardhan J. Pandit - Scale with 5 Severity Levels from Very High to Very Low - 2022-08-18 + 2024-08-16 + Terrorism + Something that acts as or causes Terrorism + accepted - 5 Severity Levels - - - - Harshvardhan J. Pandit - - - - - 2022-08-17 - accepted - Injury - Injury - + - - ISO/IEC 27005:2018 + - https://www.iso.org/standard/75281.html + https://www.iso.org/standard/72140.html + IEC 31010:2019 - + + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM7x7 S:3 L:5) accepted - 0.31,xsd:decimal Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High 2022-08-17 + 0.67,xsd:decimal + High Risk (RM3x3 S:3 L:2) - + - - Consequence on Data Security - accepted - - - - 2022-10-22 - Harshvardhan J. Pandit, Georg P. Krog + + Incident Impact Assessment + Harshvardhan J. Pandit + 2024-05-19 + - Consequence on Data Security - - - - Incident Register + An impact assessment associated with a incident accepted - A register recording incidentes, their reports, notifications, and other related activities - Harshvardhan J. Pandit + + + + + refers to risk + + - - 2024-05-19 + + Indicates the incident (subject) is a materialisation of the indicated risk (object) + 2024-02-14 + + accepted + - - Harshvardhan J. Pandit + - - 2022-08-17 - 0.67,xsd:decimal + Availability Incident + 2024-05-19 + Incident where the availability of information or system has been affected accepted - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - + - + + An actual or occured event + + + + + 2024-08-16 + + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + 2024-02-14 2024-05-19 + accepted + Incident + Incident is realised or materialised risk - accepted - - Incident caused due to deliberate actions of a human - Deliberate Incident - - - + + 2024-08-16 + + System Failure + Harshvardhan J. Pandit + accepted + - accepted - - Harshvardhan J. Pandit - - Loss of Technological Advantage - Loss of Technological Advantage 2022-08-17 - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + Here system refers to both hardware and software systems + Something that acts as or causes System Failure + + - + + + Axel Polleres + Rob Brennan + Julian Flake + Fajar Ekaputra + Beatriz Esteves + Julio Fernandez + Delaram Golpayegani + Georg P. Krog Harshvardhan J. Pandit + Delaram Golpayegani + Beatriz Esteves + Julian Flake + Rob Brennan + Harshvardhan J. Pandit + Paul Ryan + Georg P. Krog + https://w3id.org/dpv/risk + 2.1-dev + https://w3id.org/dpv/risk# + + + + + 2024-07-13 + 2022-08-14 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + + + + + + + + 2.1-dev + 10.5281/zenodo.12505841 + + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + + 2022-08-14 + http://purl.org/ontology/bibo/status/published + RISK + Risk Concepts + + + risk + + + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + accepted + 0.24,xsd:decimal + - - 2022-08-17 - - Loss of Assets - Loss of Assets - accepted - + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:4 L:3) + - - 2022-08-17 + - Retrieval of Deleted Data - - + Something that acts as or causes Component Failure + Component Failure + accepted + - Retrieval of Deleted Data - accepted - Harshvardhan J. Pandit - + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 - + + - - Theft of Equipment - Theft of Equipment - Harshvardhan J. Pandit - 2022-08-17 + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + 2024-08-16 + This concept was called "PreventExercisingOfRights" in DPV 2.0 + Something that acts as or causes Prevent Exercising of Rights + Prevent Exercising of Rights accepted - - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - + + Something that acts as or causes Erroneous System Use + 2022-08-17 + Erroneous System Use + - accepted - 0.99,xsd:decimal Harshvardhan J. Pandit - 2022-08-18 - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + 2024-08-16 - - - accepted - - + + + + - Spam - Spam + 2024-02-14 + accepted Harshvardhan J. Pandit + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" - 2022-08-17 - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + - - accepted - Very High Risk (RM5x5 S:4 L:5) + + Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + + 0.24,xsd:decimal Harshvardhan J. Pandit - 0.80,xsd:decimal 2022-08-17 - + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - + + - Harshvardhan J. Pandit - - 2022-08-17 - - Erroneous System Use accepted - Erroneous System Use - + Scale with 5 Risk Levels from Very High to Very Low + 2022-08-18 + + 5 Risk Levels + - - Environmental Safety Endangerment - Environmental Safety Endangerment - 2022-08-17 - accepted - + + Harshvardhan J. Pandit - + 2022-08-17 + 0.61,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - + accepted + Extremely High Risk (RM7x7 S:5 L:6) + - - - - Harshvardhan J. Pandit - - - - Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality + + + + is exploited by + + - Ransomware Attack - 2022-08-17 + accepted - + 2024-02-14 + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - Harshvardhan J. Pandit + + - - Replacement Costs + Harshvardhan J. Pandit + Psychological Harm + accepted + 2024-08-16 2022-08-17 + Something that acts as or causes Psychological Harm - Replacement Costs - accepted - - + + - - + + 0.11,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + Low Risk (RM3x3 S:1 L:1) + accepted + - Confidentiality Breach - accepted - Confidentiality Breach Harshvardhan J. Pandit - 2022-08-17 - - + - - - Harshvardhan J. Pandit - - - - Internal Operation Disruption - 2022-08-17 - Internal Operation Disruption + + Something that acts as or causes Distributed Denial of Service Attack (DDoS) accepted - - - 2022-08-17 - + Distributed Denial of Service Attack (DDoS) + - 0.57,xsd:decimal - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High Harshvardhan J. Pandit - Very High Risk (RM7x7 S:7 L:4) - - + + 2024-08-16 + - - Violation of Rights - 2022-08-18 + + accepted - + + Low Risk (RM7x7 S:3 L:3) - accepted - Violation of Rights - Georg P. Krog, Harshvardhan J. Pandit - + 0.18,xsd:decimal + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + Harshvardhan J. Pandit + - - Loss of Competitive Advantage - + + - accepted - Harshvardhan J. Pandit - - Loss of Competitive Advantage - 2022-08-17 - - - accepted - Very High Risk (RM5x5 S:4 L:4) - - - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - Harshvardhan J. Pandit - 0.64,xsd:decimal + 0.61,xsd:decimal + Very High Risk (RM7x7 S:6 L:5) 2022-08-17 - + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + - - - Harshvardhan J. Pandit - - - - 2022-08-17 - Loss of Goods - - Loss of Goods - accepted - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 - - - - + + 2024-08-16 2022-08-17 - - accepted - Unwanted Code Deletion - + Violation of Statutory Obligations + Harshvardhan J. Pandit - Unwanted Code Deletion - - - - 2022-08-17 - Reputation and trust impact - accepted - Reputation and trust impact - + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + modified + - - Harshvardhan J. Pandit - + Something that acts as or causes Violation of Statutory Obligations + - - 2022-08-17 + + Very Low Severity - - Unauthorised Resource Use - + 0.1,xsd:decimal + Harshvardhan J. Pandit + accepted + Level where Severity is Very Low + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + - accepted - Harshvardhan J. Pandit - Unauthorised Resource Use - + 2022-08-18 + + - - + + - Very Low Risk (RM7x7 S:3 L:2) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + 0.57,xsd:decimal + Very High Risk (RM7x7 S:7 L:4) + Harshvardhan J. Pandit accepted - 0.12,xsd:decimal - - Low Risk (RM5x5 S:1 L:4) - 2022-08-17 - 0.16,xsd:decimal - + + + Accidental Misuse + Accidental Misuse + accepted - Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - + - - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - accepted - 2024-06-12 - + + - ISO 31073:2022 Risk management vocabulary - Risk Management - - - Harshvardhan J. Pandit - 0.33,xsd:decimal - - - + Reduce Severity + Control that reduces the severity of an event - Moderate Risk (RM3x3 S:3 L:1) - 2022-08-17 - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate accepted - + 2024-05-19 + - - 0.41,xsd:decimal - + + - accepted - High Risk (RM7x7 S:4 L:5) - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + Harshvardhan J. Pandit + accepted 2022-08-17 + 0.20,xsd:decimal - - 0.16,xsd:decimal - - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - Harshvardhan J. Pandit - 2022-08-17 + + - Low Risk (RM7x7 S:4 L:2) + + + + 2024-02-14 + + has threat source + Indicates the threat (subject) has the indicated source (object) + accepted - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - System Malfunction - 2022-08-17 - - - - accepted - System Malfunction - Harshvardhan J. Pandit - + - - - Harshvardhan J. Pandit + + accepted + Lose of Goodwill - + 2022-08-17 - Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - - - accepted - Malware Attack - + Something that acts as or causes Loss of Goodwill + 2024-08-16 + - + 2022-08-17 - + Violating Code of Conduct + 2024-08-16 + + - accepted - - Violation of Contractual Obligations - Violation of Contractual Obligations + modified Harshvardhan J. Pandit - - + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + - - - Risk Concepts - N3 serialiation - - - - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - - 2022-08-17 - + + - accepted - Vandalism - + + + Data Breach Harshvardhan J. Pandit - Vandalism + Something that acts as or causes Data Breach + accepted + 2024-08-16 + 2022-08-17 + - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - Harshvardhan J. Pandit + + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - + - Sabotage - 2022-08-17 - Sabotage - + 2024-02-14 accepted - + Incident Terminated + Harshvardhan J. Pandit + - - 2022-08-17 + + modified + 2024-08-16 + Something that acts as or causes Violation of Contractual Obligations - Human Errors - - accepted - Human Errors - + 2022-08-17 + Harshvardhan J. Pandit - + + This concept was called "ViolationContractualObligations" in DPV 2.0 + Violation of Contractual Obligation + - - 0.25,xsd:decimal - + + - accepted - Level where Severity is Low Harshvardhan J. Pandit - 2022-08-18 + 0.25,xsd:decimal + Low Risk The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - Low Severity - - - - - - 2024-06-11 - - - - Misuse - Misuse accepted - Delaram Golpayegani - + Level where Risk is Low + + + - - + + 2022-08-17 + - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM3x3 S:3 L:2) Harshvardhan J. Pandit - 0.67,xsd:decimal - 2022-08-17 + Something that acts as or causes Personal Safety Endangerment + + Personal Safety Endangerment + 2024-08-16 + + accepted + + + + + + 2024-02-14 + + + is vulnerability of accepted - + Indicates the vulnerability (subject) is associated with indicated context (object) - - Loss of Funds - Loss of Funds + + - - Harshvardhan J. Pandit - - 2022-08-17 + Incident Halted + Harshvardhan J. Pandit accepted - + 2024-02-14 + The incident has halted or paused with a high likelihood of resuming or recurring + - - - + + accepted + - accepted - Unauthorised Access to Premises Harshvardhan J. Pandit 2022-08-17 + Something that acts as or causes Vulnerability Created - Unauthorised Access to Premises - + + 2024-08-16 + Vulnerability Created + - - Unauthorised Re-Identification - Georg P. Krog - - - + - 2022-08-19 - Unauthorised Re-Identification + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence accepted - - - + 2024-05-19 - - accepted - Georg P. Krog, Harshvardhan J. Pandit - Loss of Control over Data - Loss of Control over Data - - 2022-08-19 - + Incident Handling Report + - + + Extremely High Likelihood + 2022-08-18 + 0.99,xsd:decimal + - - Harshvardhan J. Pandit - - Remove Source accepted - 2024-05-19 - Control that removes the risk source - - - - Harshvardhan J. Pandit - - - - 2022-08-17 + Level where Likelihood is Extremely High - accepted - - Vulnerability Exploited - Vulnerability Exploited - + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + - + + + accepted + 2024-02-14 + Risk Source - - accepted - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - 2022-08-18 - Harshvardhan J. Pandit - + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + 2024-08-16 - - Monitor Impact + + Harshvardhan J. Pandit + accepted + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - + - Control that monitors a Risk Impact - - accepted - 2024-05-19 - + 0.73,xsd:decimal + Extremely High Risk (RM7x7 S:6 L:6) + - - + + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + 2024-05-19 - - accepted - Loss of Trust - Harshvardhan J. Pandit - Loss of Trust + - 2022-08-17 - + Incident Preliminary Report + accepted - + + Harshvardhan J. Pandit - - - + 2024-08-16 2022-08-17 + This concept was called "Corruption Data" in DPV 2.0 - accepted - Fraud - Fraud - - + modified + + + + Something that acts as or causes Corruption of Data + Data Corruption + - + + ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + accepted - + 2024-02-14 Harshvardhan J. Pandit - Psychological Harm - Psychological Harm - - 2022-08-17 + + Status associated with an incident + + Incident Status - accepted - - + + ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - Harshvardhan J. Pandit - + + accepted - + + Harshvardhan J. Pandit 2022-08-17 - Violation of Code of Conduct - accepted - Violation of Code of Conduct - - + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + Risk Matrix 3x3 + + - - Known Vulnerability Exploited + + Something that acts as or causes Unauthorised Resource Use + Unauthorised Resource Use Harshvardhan J. Pandit + 2024-08-16 + 2022-08-17 + + - - 2022-08-17 accepted - - Known Vulnerability Exploited - + - + + + - - 2024-05-19 - Incident caused due to accidental actions arising from human or human-controlled situations - Accidental Incident + 2024-02-14 accepted - + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + Harshvardhan J. Pandit + - - - + - 2024-02-14 - Indicates the use of specified control - has control - accepted - - - - 0.01,xsd:decimal - + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 Harshvardhan J. Pandit - Extremely Low Risk - Level where Risk is Extremely Low - 2022-08-18 - - accepted - + 2022-08-17 + 0.10,xsd:decimal + - - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - High Risk - 0.75,xsd:decimal + + Very Low Risk (RM5x5 S:1 L:2) + - + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Harshvardhan J. Pandit accepted - 2022-08-18 - Level where Risk is High + 2022-08-17 + 0.08,xsd:decimal + + + Harshvardhan J. Pandit + accepted + 2022-08-17 + 0.20,xsd:decimal + Low Risk (RM7x7 S:2 L:5) - - - - - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - + - - Economic Disadvantage - 2022-08-19 - Economic Disadvantage - accepted - Georg P. Krog - + - - - Risk Assessment + + Risks and issues that affect or have the potential to affect specific individuals + Individual Risk - ISO 31073:2022 Risk management vocabulary - 2024-02-14 - Assessment of risk involving its identification, analysis, and evaluation accepted - - 2022-08-17 - + + - accepted - Harshvardhan J. Pandit - System Intrusion - System Intrusion - - - - Harshvardhan J. Pandit - - - - Authorisation Failure - Authorisation Failure 2022-08-17 - - + Something that acts as or causes Unauthorised Data Modification + Unauthorised Data Modification + + 2024-08-16 accepted - + - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 2022-08-17 - - Extremely High Risk (RM7x7 S:7 L:5) - + + + High Likelihood + + 0.75,xsd:decimal accepted - 0.71,xsd:decimal + Level where Likelihood is High Harshvardhan J. Pandit - + 2022-08-18 + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + + + - - + + Examples for Data Privacy Vocabulary + - Risk Concepts - RDF/XML serialiation - - - + + + - - + + accepted - Georg P. Krog, Harshvardhan J. Pandit - Limitation of Rights - Limitation of Rights - 2022-08-18 + Georg P. Krog + 2024-08-16 + Something that acts as or causes Social Disadvantage + Social Disadvantage + 2022-08-19 - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + - - Harm + - Impact that acts as or causes harms - + accepted + - accepted - 2022-08-13 Harshvardhan J. Pandit - + Identity Fraud + 2022-08-17 + + 2024-08-16 + Something that acts as or causes Identity Fraud + - - - 2024-05-19 - - - - accepted - Recovery Control - Control to recover from event - - - - Harshvardhan J. Pandit - - - - 2022-08-17 - - accepted - - Physical Stalking - Physical Stalking - - - - Moderate Risk (RM3x3 S:1 L:3) - 2022-08-17 - - - - accepted - Harshvardhan J. Pandit - 0.33,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - - - - 2022-08-17 - - - - - accepted - - Harshvardhan J. Pandit - Loss of Customer Confidence - Loss of Customer Confidence - - - - - - - - accepted - Scale with 5 Risk Levels from Very High to Very Low - Harshvardhan J. Pandit - 5 Risk Levels - 2022-08-18 - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - - - Harshvardhan J. Pandit - - - - 2022-08-17 - - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - 0.40,xsd:decimal - accepted - High Risk (RM5x5 S:2 L:5) - - - - accepted - - - - Financial Personnel Costs - - Financial Personnel Costs - Harshvardhan J. Pandit - 2022-08-17 - - - - - - - Incident caused due to environmental factors outside human controls - - 2024-05-19 - - Environmental Incident - accepted - - - Control that reduces the severity of an event - - - - Reduce Severity - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - Monitor Risk - Harshvardhan J. Pandit - - - - Control that monitors a Risk - - 2024-05-19 - accepted - - - - - - - Harshvardhan J. Pandit - - Control that monitors a Risk Source - 2024-05-19 - accepted - Monitor Risk Source - - - - Cyber Spying - 2022-08-17 - - - - - accepted - Cyber Spying - Harshvardhan J. Pandit - - - - - 2022-08-17 - - Cost of Suspended Operations - - - - - accepted - Cost of Suspended Operations - Harshvardhan J. Pandit - - - - Very High Risk (RM7x7 S:4 L:6) - 2022-08-17 - 0.49,xsd:decimal - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - - - accepted - Harshvardhan J. Pandit - - - - Harshvardhan J. Pandit - 2022-08-17 - - 0.49,xsd:decimal - accepted - - - - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - - - - - - - Harshvardhan J. Pandit - 2022-08-17 - - Terrorism - accepted - Terrorism - - - - - Harshvardhan J. Pandit - - - - - - Business disruption - Business disruption - 2022-08-17 - accepted - - - - Extorsion - - - 2022-08-17 - accepted - - - - Extorsion - Harshvardhan J. Pandit - - - - Very High Risk - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - - - - accepted - Harshvardhan J. Pandit - 2022-08-18 - Level where Risk is Very High - 0.9,xsd:decimal - - - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - - 2022-08-17 - accepted - - - - Loss of Opportunity - - Loss of Opportunity - Harshvardhan J. Pandit - - - - Harshvardhan J. Pandit - - - - 2022-08-17 - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - accepted - 0.24,xsd:decimal - Moderate Risk (RM7x7 S:2 L:6) - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - accepted - - - - - Citizens impact - Citizens impact - Harshvardhan J. Pandit - 2022-08-17 - - - - - 2022-08-17 - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:2 L:1) - accepted - - - - 0.04,xsd:decimal - Harshvardhan J. Pandit - - - - - - - Cost of Configuration - accepted - Harshvardhan J. Pandit - 2022-08-17 - - Cost of Configuration - - - - - accepted - - - - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - 0.99,xsd:decimal - Harshvardhan J. Pandit - - 2022-08-17 - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - - - - A type of social engineering attack involving deceptive messages intended to reveal sensitive information - 2022-08-17 - - - Phishing Scam - accepted - Harshvardhan J. Pandit - - - - Harshvardhan J. Pandit - - - - Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) - 2022-08-17 - - - Misinformation and Disinformation - accepted - - - - - - Risk Concepts - Turtle serialiation - - - - - - Harshvardhan J. Pandit - - - - Stalking - Stalking - 2022-08-17 - - - accepted - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - 2022-08-17 - - - - - - accepted - Security Breach - Security Breach - Harshvardhan J. Pandit - - - - 2022-08-17 - - accepted - - - - - Physical Assault - Physical Assault - Harshvardhan J. Pandit - - - - accepted - 2024-02-14 - - - - has incident - - Indicates an incident is associated with the specified context - - - + + Unauthorised System Modification + + 2024-08-16 2022-08-17 - - accepted - - - - 0.24,xsd:decimal - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - Harshvardhan J. Pandit - - - - 2024-05-19 - - - - Control that removes Impact i.e. prevents it from materialising - accepted + Something that acts as or causes Unauthorised System Modification Harshvardhan J. Pandit - Remove Impact - - - - - accepted - - - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - 2024-05-19 - Incident Ongoing Report - - - 2022-08-17 - - 0.60,xsd:decimal accepted - - - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - Very High Risk (RM5x5 S:3 L:5) - Harshvardhan J. Pandit - - - - - 2022-08-17 - + - Equipment Failure - Equipment Failure - accepted - - Harshvardhan J. Pandit - - - - - - - - 2024-02-14 - accepted - - - Indicates the threat (subject) has the indicated source (object) - has threat source + - - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + accepted - - - - 0.5,xsd:decimal - Level where Likelihood is Moderate - Harshvardhan J. Pandit - - 2022-08-18 - Moderate Likelihood - - - - - - + Harshvardhan J. Pandit - 2022-08-17 - Very Low Risk (RM7x7 S:2 L:3) + 2024-05-19 + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - accepted - 0.12,xsd:decimal - + - + + - - Low Risk (RM3x3 S:1 L:2) - Harshvardhan J. Pandit - 2022-08-17 - - 0.22,xsd:decimal + Control to identify characteristics of event accepted - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - - - - 0.29,xsd:decimal - Harshvardhan J. Pandit - 2022-08-17 - Moderate Risk (RM7x7 S:7 L:2) - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - + Identification Control + 2024-05-19 + - - Harshvardhan J. Pandit - Misuse of Breached Information - - - - + + - 2022-08-17 - accepted - Misuse of Breached Information - - - - - - - Reward - 2024-04-14 accepted - Georg P. Krog, Harshvardhan J. Pandit - - Reward provided as compensation (as an impact) - - - + Indicates the associated context (subject) has indicated vulnerability (object) + + has vulnerability - - is exploited by - - 2024-02-14 - - - accepted - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - 2022-08-17 - - Service Interruption - - - - - Service Interruption - accepted - Harshvardhan J. Pandit - - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - - - - 2024-02-14 - - - - accepted - The incident is ongoing i.e. still active - Harshvardhan J. Pandit - Incident Ongoing - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - - - Harshvardhan J. Pandit - - 2022-08-17 - 0.36,xsd:decimal - Moderate Risk (RM5x5 S:3 L:3) - accepted - - - - - - - Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - 0.32,xsd:decimal - 2022-08-17 - - accepted - Moderate Risk (RM5x5 S:2 L:4) - - - 2022-08-17 + - - - - accepted - Vulnerability Created - Vulnerability Created - - Harshvardhan J. Pandit - - - - Compliance impact - Compliance impact - Harshvardhan J. Pandit - + - - 2022-08-17 - accepted - + 2024-05-19 + Control to contain event + Containment Control + - - + + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + - 2022-08-18 - Harshvardhan J. Pandit - Level where Likelihood is Very Low - - 0.1,xsd:decimal + Detriment accepted - Very Low Likelihood - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - - - - - Harshvardhan J. Pandit - - - + 2024-08-16 - 3 Risk Levels - accepted - 2022-08-18 - Scale with 3 Risk Levels from High to Low - + 2022-03-23 + Something that acts as or causes Detriment + - + + + 2024-05-19 + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again accepted - + Incident Mitigation Measure + - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - Incident Suspected - Harshvardhan J. Pandit - - 2024-02-14 - - - Compromise Account Credentials - Harshvardhan J. Pandit + + + Risks and issues that have their origin in environment or can affect the environment at large + Environmental Risk + - - 2022-08-17 - - accepted - Compromise Account Credentials - + - - Vulnerability - 2024-02-14 + + Re-identification + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + + Harshvardhan J. Pandit accepted - - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + 2024-08-16 + Something that acts as or causes Re-identification + - + + - - 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 0.12,xsd:decimal accepted - System Failure - - System Failure + Very Low Risk (RM7x7 S:1 L:6) Harshvardhan J. Pandit - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + 2022-08-17 + - - Harshvardhan J. Pandit + - + - 2022-08-17 + + 2024-08-16 - Financial Loss + Coercion + Harshvardhan J. Pandit accepted - Financial Loss - - + Something that acts as or causes Coercion + 2022-08-17 + - - - + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low 2022-08-17 - + Low Risk (RM7x7 S:1 L:7) + 0.14,xsd:decimal + accepted + - Industrial Crisis - Industrial Crisis - accepted Harshvardhan J. Pandit - + + - - accepted - 0.5,xsd:decimal - + + - Harshvardhan J. Pandit - 2022-08-18 + - Moderate Severity - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - Level where Severity is Moderate - - - + Harshvardhan J. Pandit + Here equipment refers to physical equipment + accepted + Equipment Failure + 2024-08-16 + 2022-08-17 + Something that acts as or causes Equipment Failure + - + + + - + Harshvardhan J. Pandit - Change Impact - 2024-05-19 - Control that changes Impact + 2022-08-17 + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + 2024-08-16 accepted - + - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - ENISA Methodology for Sectoral Cybersecurity Assessments - - + + - Harshvardhan J. Pandit - 0.14,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - Low Risk (RM7x7 S:7 L:1) accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - + 0.67,xsd:decimal + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + - - - - - + accepted 2024-05-19 - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - Incident Mitigation Measure - - - + - 0.24,xsd:decimal + Control that changes Consequence Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 2022-08-17 + Change Consequence - Moderate Risk (RM7x7 S:3 L:4) - accepted - + - - - - - 0.48,xsd:decimal + + 0.04,xsd:decimal Harshvardhan J. Pandit - 2022-08-17 - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High accepted - High Risk (RM5x5 S:4 L:3) - - - - + 2022-08-17 + - accepted - Danger to Customers - Danger to Customers - Harshvardhan J. Pandit - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - 2022-08-17 - + Extremely Low Risk (RM7x7 S:1 L:2) + - - - Illegal Processing of Data + + accepted 2022-08-17 - + 0.37,xsd:decimal + + - accepted - Illegal Processing of Data - + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High Harshvardhan J. Pandit - + High Risk (RM7x7 S:3 L:6) + - - Risk Matrix - 2024-02-14 - accepted - + + Something that acts as or causes benefits + 2024-08-16 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + - - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Harshvardhan J. Pandit - + Benefit + 2022-03-23 + accepted + - - 2024-02-14 + + 2022-08-17 + accepted - + 0.48,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - Threat Source - - Source of threat event, including both agent and non-agent sources + Harshvardhan J. Pandit + High Risk (RM5x5 S:4 L:3) + - - - + + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + - accepted - Harshvardhan J. Pandit - 2022-08-17 + Reward + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + 2024-08-16 - Increase Internal Cost - Increase Internal Cost - - - accepted - + + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + + Georg P. Krog, Harshvardhan J. Pandit + - - Coercion - Coercion - Harshvardhan J. Pandit - 2022-08-17 - + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + accepted + 2024-08-16 + 2024-04-14 + - - Unauthorised Information Disclosure - + + - Unauthorised Information Disclosure - accepted - Harshvardhan J. Pandit - - 2022-08-17 - + Concepts associated with security threats that are likely to originate externally + accepted + External Security Threat + - + + Level where Risk is High + + 0.75,xsd:decimal + High Risk Harshvardhan J. Pandit - Organisation Disruption - + accepted - + - Organisation Disruption + 2022-08-18 + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + + + + + + 2024-04-14 - 2022-08-17 accepted - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + - Change Consequence + Something that acts as or provides renumeration which is in monetary or financial form + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + Remuneration + + + + A report describing the suspicion of an incident in the past or occuring - Control that changes Consequence - 2024-05-19 accepted - Harshvardhan J. Pandit - - - - 2024-02-14 - + 2024-05-19 + Incident Suspected Report - accepted - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - Incident Concluded - Harshvardhan J. Pandit + + + + Something that acts as or causes Confidentiality Breach + Confidentiality Breach + 2024-08-16 - - - + Harshvardhan J. Pandit + accepted + - - - Violation of Ethical Code + 2022-08-17 - accepted - - Violation of Ethical Code - Harshvardhan J. Pandit - + - - - 2024-02-14 - + + - Incident Halted + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it accepted - Harshvardhan J. Pandit - The incident has halted or paused with a high likelihood of resuming or recurring - + - + + + + + + Risk Concepts - JSON-LD serialiation + + + + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + accepted + 2022-08-17 + High Risk (RM5x5 S:3 L:4) Harshvardhan J. Pandit - - + - 2022-08-17 - accepted - Unauthorised System Access - Unauthorised System Access - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + 0.48,xsd:decimal + - + + - - Control that reduces the likelihood or severity of an event - Reduction Control - 2024-05-19 + Something that acts as or causes Component Malfunction + Component Malfunction + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - + - - 2022-08-17 - + + - Physical Spying + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + Risk Matrix + + + Harshvardhan J. Pandit accepted - Physical Spying + 2024-02-14 + + + + 2024-08-16 + 2022-08-17 + Something that acts as or causes Unwanted Disclosure of Data Harshvardhan J. Pandit - + accepted + + + - + Unwanted Disclosure of Data + + - - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - + + + - 0.75,xsd:decimal accepted - Level where Severity is High Harshvardhan J. Pandit - High Severity - + 7 Likelihood Levels 2022-08-18 - - - + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + - - ENISA Methodology for Sectoral Cybersecurity Assessments + - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Harshvardhan J. Pandit - - - - - Cost of Installation - 2022-08-17 - Cost of Installation + accepted - - - - - 2022-08-17 + 2024-05-19 + Confidentiality Incident + + Incident where the confidentiality of information or system has been affected - - accepted - Spoofing - Spoofing - Harshvardhan J. Pandit - - - - 0.99,xsd:decimal - Level where Risk is Extremely High - Harshvardhan J. Pandit - 2022-08-18 - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + accepted + - + Risk Assessment - accepted - Extremely High Risk - + Assessment of risk involving its identification, analysis, and evaluation + ISO 31073:2022 Risk management vocabulary + 2024-02-14 - - - Harshvardhan J. Pandit - - - - 2022-08-17 + accepted - Unauthorised Code Modification - Unauthorised Code Modification - - - - 2022-08-17 - + Something that involves or causes judicial costs to be paid + - Blackmail - Blackmail - accepted - Harshvardhan J. Pandit - - - + Judicial Costs + - - + + Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.08,xsd:decimal - Very Low Risk (RM5x5 S:2 L:1) + Something that acts as or causes Cryptojacking + + accepted + 2024-08-16 2022-08-17 + Cryptojacking - accepted - + - - - - 2022-08-17 - Loss of Resources - + + - Loss of Resources + accepted + + Lose of Credibility Harshvardhan J. Pandit - - - + 2024-08-16 2022-08-17 - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - + Something that acts as or causes Loss of Credibility + + + + Harshvardhan J. Pandit + accepted + - accepted - 0.99,xsd:decimal - High Risk (RM3x3 S:3 L:3) - Harshvardhan J. Pandit - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + Harm + 2022-08-13 + Something that acts as or causes Harm to humans + 2024-08-16 + This concept refers to the general abstract notion of harm + + - - Cyber Stalking - Cyber Stalking + + - + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Level where Risk is Extremely Low accepted - + 2022-08-18 + Extremely Low Risk Harshvardhan J. Pandit - 2022-08-17 + 0.01,xsd:decimal - + - - - 2022-08-17 + - + + Concepts associated with risks that arise due to User or Human use accepted - Harshvardhan J. Pandit - Impact to Rights - Impact to Rights - + User Risks + - + + - - Georg P. Krog, Harshvardhan J. Pandit - Fee provided as compensation (as an impact) - Fee - 2024-04-14 - DGA 2.10 + Injury + Something that acts as or causes Injury + + 2024-08-16 + 2022-08-17 + Harshvardhan J. Pandit accepted - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + 0.5,xsd:decimal + Harshvardhan J. Pandit + + + + + Moderate Risk + Level where Risk is Moderate + accepted + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 + + + - - - + + - Loss of Customers - Loss of Customers + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + Harshvardhan J. Pandit + accepted + Very Low Risk (RM5x5 S:1 L:1) 2022-08-17 + 0.04,xsd:decimal + + + + + + + Georg P. Krog + 2024-08-16 + 2022-08-19 + Something that acts as or causes Discrimination accepted - + Discrimination + - - 2022-08-17 - Low Risk (RM5x5 S:4 L:1) + + Notice associated with an Incident - + + accepted + Incident Notice + 2024-05-19 - accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 0.16,xsd:decimal - Harshvardhan J. Pandit - - + + + + + Guides for Data Privacy Vocabulary + + + + + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + 2022-08-17 + - - + Moderate Risk (RM3x3 S:1 L:3) + + 0.33,xsd:decimal accepted - Theft Harshvardhan J. Pandit - Theft - 2022-08-17 - - + - - - accepted - + + - Danger to Personnel - Danger to Personnel Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:7 L:5) + 0.71,xsd:decimal + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High 2022-08-17 - + - - 2022-08-17 - Low Risk (RM7x7 S:2 L:4) - 0.16,xsd:decimal - + + - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - Harshvardhan J. Pandit + Scale with 7 Severity Levels from Extremely High to Extremely Low + 2022-08-18 + 7 Severity Levels - + Harshvardhan J. Pandit + accepted + - + + + + + Level where Severity is Extremely Low + Extremely Low Severity + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 0.01,xsd:decimal + + Harshvardhan J. Pandit accepted + 2022-08-18 + + + + 0.08,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - 0.80,xsd:decimal + Very Low Risk (RM7x7 S:1 L:4) + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low Harshvardhan J. Pandit 2022-08-17 - - Very High Risk (RM5x5 S:5 L:4) - + accepted + - - Incident Handling Report + + 2022-08-17 + - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - 2024-05-19 + Sexual Violence + + Something that acts as or causes Sexual Violence + 2024-08-16 + Harshvardhan J. Pandit accepted + - + Harshvardhan J. Pandit - Privacy impact + accepted - + - 2022-08-17 + 0.06,xsd:decimal - Privacy impact - accepted - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:1 L:3) + - - 2022-08-17 + + Scale with 3 Likelihood Levels from High to Low - Attack on Private Life - - - - accepted - Attack on Private Life - + 3 Likelihood Levels Harshvardhan J. Pandit - - - - 2022-03-23 - + accepted + - accepted - Detriment - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - Impact that acts as or causes detriments - + 2022-08-18 + - - - + + + Moderate Risk (RM3x3 S:3 L:1) + - Financial Investigation Costs - accepted - Financial Investigation Costs + 0.33,xsd:decimal Harshvardhan J. Pandit - + accepted 2022-08-17 - + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + - - + + Something that acts as or causes violation of policy which can be either internal or external policy + Violating Policy + - accepted - Renumeration provided as compensation (as an impact) - Georg P. Krog, Harshvardhan J. Pandit - Remuneration - 2024-04-14 - + accepted + - - Harshvardhan J. Pandit - 2022-08-17 + - + Moderate Risk (RM5x5 S:3 L:3) + accepted + 0.36,xsd:decimal + - accepted - Violation of Statutory Obligations - Violation of Statutory Obligations - - + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + 2022-08-17 + - + + 2022-08-18 + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Harshvardhan J. Pandit - + - accepted - - Compromise Account - Compromise Account - Harshvardhan J. Pandit - 2022-08-17 - + 0.9,xsd:decimal + accepted + Level where Likelihood is Very High + Very High Likelihood + + - + + 0.43,xsd:decimal + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + Very High Risk (RM7x7 S:3 L:7) - accepted - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low Harshvardhan J. Pandit - 0.08,xsd:decimal + accepted 2022-08-17 - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - An actual or occured event - 2024-05-19 - 2024-02-14 - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + Something that acts as or causes Non-Material Damage + The criteria for what is considered material damage is based in jurisdictional laws and norms + accepted + - - - accepted - Incident - - Incident is realised or materialised risk + Harshvardhan J. Pandit + 2022-03-30 + Non-Material Damage + 2024-08-16 + - - + + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + accepted - Harshvardhan J. Pandit + 0.12,xsd:decimal + 2022-08-17 - + - - Loss of Proprietary Information - 2022-08-17 - Loss of Proprietary Information - + Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:3 L:1) + - - - A report describing the detection of a Incident + accepted Incident Detection Report + A report describing the detection of a Incident - accepted 2024-05-19 - - - - The status of a incident is unknown - Harshvardhan J. Pandit - - Incident Status Unknown - 2024-02-14 - accepted - - - 0.11,xsd:decimal + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + + + + Something that acts as or causes Loss of Opportunity + 2024-08-16 accepted - + - Low Risk (RM3x3 S:1 L:1) + Lose of Opportunity + Harshvardhan J. Pandit 2022-08-17 - - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + - accepted Harshvardhan J. Pandit - - - Cost of Backup - Cost of Backup + accepted + 0.12,xsd:decimal 2022-08-17 - + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + - + + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + 2024-02-14 + + + + + accepted + + + + + + Cross-Border Incident - - Notice associated with an Incident accepted 2024-05-19 + Incident involving cross-border or multiple jurisdictions - Incident Notice - - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + Detection Control - - - - accepted - Harshvardhan J. Pandit - Eavesdropping - Eavesdropping - 2022-08-17 - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - - High Risk (RM5x5 S:5 L:2) - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - 0.40,xsd:decimal - + - accepted - Harshvardhan J. Pandit - + Control to detect event + 2024-05-19 + - - - 2022-08-17 - + + 2024-05-19 + Environmental Incident + + + Incident caused due to environmental factors outside human controls accepted - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - 0.73,xsd:decimal - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + - Harshvardhan J. Pandit - 2022-08-18 - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - Level where Risk is Low accepted - Low Risk - 0.25,xsd:decimal - - - + 0.20,xsd:decimal + 2022-08-17 + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + Harshvardhan J. Pandit + accepted + + + + + 2022-03-30 + Damage + 2024-08-16 + Something that acts as or causes Damage + - + + - - 2022-08-17 + Risk Mitigation Measure that uses controls to monitor events + 2024-05-19 + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - - accepted - Loss of Credibility - Loss of Credibility Harshvardhan J. Pandit - + accepted + Monitor Control + - - + 2022-08-17 - - - + + 2024-08-16 accepted + Something that acts as or causes Impact to Rights Harshvardhan J. Pandit - Unauthorised Code Disclosure - Unauthorised Code Disclosure + + + + Impact to Rights + This concept was called "ImpactToRights" in DPV 2.0 - + + - - + + - Extremely Low Risk (RM7x7 S:1 L:3) - 0.06,xsd:decimal - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - 2022-08-17 accepted - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + Judicial Penalty + Something that involves or causes judicial penalties to be paid + - + - 2024-02-14 + + Authorisation Failure + 2024-08-16 + 2022-08-17 + Something that acts as or causes Authorisation Failure accepted - Threat + - Risk source event which causes Risk - + Harshvardhan J. Pandit + - - Very Low Risk (RM5x5 S:1 L:1) - 0.04,xsd:decimal + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + Harshvardhan J. Pandit accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - + + - Harshvardhan J. Pandit + Something that acts as or causes Copyright Violation + 2022-08-17 - - + 2024-08-16 + Copyright Violation + - + + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + 0.64,xsd:decimal + - accepted - 0.16,xsd:decimal Harshvardhan J. Pandit - - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low 2022-08-17 + accepted + Very High Risk (RM5x5 S:4 L:4) - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Corruption of Data - - accepted - - - + Harshvardhan J. Pandit - Corruption of Data - 2022-08-17 - - - - accepted - Control to contain event + 2024-05-19 + Monitor Control - Containment Control - 2024-05-19 - + Control that monitors another Control + - + + Physical Harm + - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - accepted - 2024-05-19 + - - - - - High Risk (RM7x7 S:5 L:4) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - + 2022-08-17 - 0.41,xsd:decimal - accepted - - - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - Harshvardhan J. Pandit - + - 2022-08-17 - Extremely High Risk (RM7x7 S:5 L:7) + Something that acts as or causes Unauthorised System Access + Unauthorised System Access + 2024-08-16 + + Harshvardhan J. Pandit accepted - 0.71,xsd:decimal - + - - Halt Source + + 2024-08-16 + Something that acts as or causes Malicious Code Attack + + accepted - Control that halts the risk source or prevents it from materialising - Harshvardhan J. Pandit - + - - 2024-05-19 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + Harshvardhan J. Pandit + 2022-08-17 + Malicious Code Attack + - + + Moderate Risk (RM3x3 S:2 L:2) + - - Harshvardhan J. Pandit - Control that monitors a Risk Consequence accepted - 2024-05-19 - Monitor Consequence - + 2022-08-17 + Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + 0.44,xsd:decimal + - - 2024-05-19 - Risk Mitigation Measure that controls the Source + + accepted - Source Control + Monitor Vulnerabilities Harshvardhan J. Pandit - - + Control that monitors a Risk Vulnerability + 2024-05-19 + - - + + - Impact that acts as or causes material damages - Harshvardhan J. Pandit + Level where Likelihood is Very Low - 2022-03-30 + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted - Material Damage - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + 0.1,xsd:decimal + Very Low Likelihood + 2022-08-18 + + - + + 0.25,xsd:decimal + 2022-08-18 + accepted + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - + - - 2022-08-17 - accepted - Identity Fraud - Identity Fraud Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Level where Severity is Low + Low Severity + + + - - + 2022-08-17 - Loss of Data - + Very High Risk (RM7x7 S:5 L:5) + 0.51,xsd:decimal + + accepted + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + - - accepted - Loss of Data Harshvardhan J. Pandit - + - + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Very High Risk (RM5x5 S:5 L:4) - accepted - 0.12,xsd:decimal Harshvardhan J. Pandit + accepted + 0.80,xsd:decimal - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low 2022-08-17 - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - Loss of Goodwill - Harshvardhan J. Pandit - Loss of Goodwill - + + accepted + 2024-05-19 + Avoid Source + Control that avoids the risk source - + - 2022-08-17 - accepted - + Harshvardhan J. Pandit + - - + + This concept was called "InterceptionCommunications" in DPV 2.0 + Something that acts as or causes Interception of Communications + + modified + Harshvardhan J. Pandit - 0.29,xsd:decimal 2022-08-17 - - Moderate Risk (RM7x7 S:2 L:7) - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + Intercept Communications + 2024-08-16 + - + + - - Harshvardhan J. Pandit + Control that monitors a Risk Impact - 2022-08-17 - + Harshvardhan J. Pandit accepted - Business Performance Impairment - Business Performance Impairment - - - - - - Risk Control 2024-05-19 - Control that modifies risk + Monitor Impact + + + + 0.22,xsd:decimal + + Harshvardhan J. Pandit accepted - + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + Low Risk (RM3x3 S:2 L:1) + 2022-08-17 + + - - - has risk source - - + + + 2024-02-14 accepted - - - Indicates the risk (subject) has the indicated risk source (object) + + Source of threat event, including both agent and non-agent sources + Threat Source - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - accepted - + + + + 2024-08-16 + - Harshvardhan J. Pandit + accepted + Unwanted Data Deletion 2022-08-17 - - Unauthorised Data Access - Unauthorised Data Access - + Something that acts as or causes Unwanted Data Deletion + - - + + Risk Matrix 5x5 + - Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - 2022-08-17 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - 0.12,xsd:decimal + Harshvardhan J. Pandit accepted - Very Low Risk (RM5x5 S:3 L:1) - + 2022-08-17 + - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + + - accepted - Scale with 7 Severity Levels from Extremely High to Extremely Low + 2022-08-17 Harshvardhan J. Pandit + 0.71,xsd:decimal - 2022-08-18 - 7 Severity Levels - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + accepted + Extremely High Risk (RM7x7 S:5 L:7) + - + - + Incident caused due to accidental actions arising from human or human-controlled situations - Child Violence - 2022-08-17 accepted - Child Violence - Harshvardhan J. Pandit - - + Accidental Incident + 2024-05-19 + - - Harshvardhan J. Pandit - Re-identification + + Things that cause or have the potential to impact financial resources - 2022-08-19 - + accepted + Financial Impact + - accepted - Re-identification - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - ENISa Trust Services Security Incidents 2021 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - + + + 2024-08-16 + Something that acts as or causes Human Errors + accepted + Human Errors + - Harshvardhan J. Pandit - 2022-08-17 - Retrieval of Discarded Equipment - Retrieval of Discarded Equipment - accepted - + 2022-08-17 + - - - - + Harshvardhan J. Pandit - 2022-08-17 - - Distributed Denial of Service Attack (DDoS) - Distributed Denial of Service Attack (DDoS) accepted - - - - - Low Likelihood - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - 0.25,xsd:decimal - + - accepted - Level where Likelihood is Low - Harshvardhan J. Pandit - 2022-08-18 - - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + 2022-08-17 + 0.37,xsd:decimal + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + Risk Concepts - Turtle serialiation + + + + - - 2024-05-19 + + Risks and issues that affect or have the potential to affect society at large or specific groups in society + - accepted - - Incident Identifier - Identifier associated with an incident + accepted + Societal Risk + - - 2022-08-17 + - accepted - Very Low Risk (RM5x5 S:1 L:2) - + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - Harshvardhan J. Pandit - 0.08,xsd:decimal - + Individual Health & Safety + accepted + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - - - - High Risk (RM5x5 S:5 L:3) + Harshvardhan J. Pandit 2022-08-17 - - 0.60,xsd:decimal - accepted - - - + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + - - Harshvardhan J. Pandit - - Unknown Vulnerability Exploited - Unknown Vulnerability Exploited - 2022-08-17 + 0.22,xsd:decimal accepted - + - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - - + + Something that acts as or causes Unauthorised Re-Identification + 2024-08-16 + - - Harshvardhan J. Pandit + Unauthorised Re-Identification + 2022-08-19 - 2022-08-17 - Equipment Malfunction - Equipment Malfunction + Georg P. Krog accepted - + - - 0.37,xsd:decimal - - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - + + Something that acts as or causes Sabotage + 2024-08-16 + - accepted - High Risk (RM7x7 S:6 L:3) + + Sabotage + Harshvardhan J. Pandit - + accepted + 2022-08-17 + - - - Third Party Operation Disruption - Harshvardhan J. Pandit + + accepted - + + Harshvardhan J. Pandit 2022-08-17 - Third Party Operation Disruption + + 2024-08-16 + Something that acts as or causes Unauthorised Code Access + Unauthorised Code Access + + + accepted - + Reputational Risk + + + + + Risks and issues that affect the reputation of the organisation + - - Unauthorised System Modification - Harshvardhan J. Pandit + + - - Unauthorised System Modification - 2022-08-17 - + accepted - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments + 2022-08-17 + 2024-08-16 + Fraud + Something that acts as or causes Fraud + Harshvardhan J. Pandit + - - Georg P. Krog, Harshvardhan J. Pandit + + - - Compensation - Compensation provided (as an impact) - 2024-04-14 + Control that halts the risk source or prevents it from materialising + Harshvardhan J. Pandit + Halt Source accepted - + 2024-05-19 + - - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - 2022-08-17 - Low Risk (RM5x5 S:5 L:1) - accepted Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low 0.20,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + Low Risk (RM5x5 S:5 L:1) + accepted + 2022-08-17 - + accepted - Interception of Communications - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + 2022-08-17 - + Harshvardhan J. Pandit - 2022-08-17 + 0.32,xsd:decimal + Moderate Risk (RM5x5 S:2 L:4) - Interception of Communications - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + Primer for Data Privacy Vocabulary + + + + Blackmail + + + + Harshvardhan J. Pandit + + accepted 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Something that acts as or causes Blackmail + 2024-08-16 + + + + + + + Consequence Control + + Risk Mitigation Measure that controls the Consequences + Harshvardhan J. Pandit accepted - High Risk (RM7x7 S:3 L:6) - + 2024-05-19 + + + + 2022-08-17 + Moderate Risk (RM7x7 S:6 L:2) + + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate Harshvardhan J. Pandit - 0.37,xsd:decimal + 0.24,xsd:decimal + + accepted - - + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + High Risk (RM7x7 S:4 L:5) + + - + Harshvardhan J. Pandit accepted + 2022-08-17 + 0.41,xsd:decimal + + + + 2022-08-17 + 2024-08-16 + Something that acts as or causes Unauthorised Information Disclosure + + Unauthorised Information Disclosure + + + + Harshvardhan J. Pandit + accepted + + + + + + + + Something that acts as or causes System Intrusion - Theft of Media + 2024-08-16 + System Intrusion + accepted + Harshvardhan J. Pandit 2022-08-17 - Theft of Media - + - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + + Something that acts as or causes Equipment Malfunction + Equipment Malfunction + Here equipment refers to physical equipment + Harshvardhan J. Pandit accepted + - + 2022-08-17 - Benefit - 2022-03-23 - Impact(s) that acts as or causes benefits - + + 2024-08-16 + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - accepted - 0.24,xsd:decimal + Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - 2022-08-17 + 0.80,xsd:decimal - Moderate Risk (RM5x5 S:3 L:2) + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + accepted + Very High Risk (RM5x5 S:4 L:5) - - + + + + + accepted + + + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + - - - + + + + 0.9,xsd:decimal accepted + Very High Severity Harshvardhan J. Pandit - - Financial Repair Costs - Financial Repair Costs - 2022-08-17 - + 2022-08-18 + Level where Severity is Very High + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + - - + + + Risk Concepts - RDF/XML serialiation + + + + + + + The incident is ongoing i.e. still active + + Incident Ongoing + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - 0.57,xsd:decimal + 2024-02-14 Harshvardhan J. Pandit + + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + + + - Very High Risk (RM7x7 S:4 L:7) + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Data Access 2022-08-17 - + Unauthorised Data Access + 2024-08-16 + accepted + - + + - - Cost of Judicial Proceedings - - 2022-08-17 - Cost of Judicial Proceedings accepted - Harshvardhan J. Pandit - + Georg P. Krog, Harshvardhan J. Pandit + This concept was called "LimitationOfRights" in DPV 2.0 + Something that acts as or causes Limitation of Rights + Limitation of Rights + 2022-08-18 + 2024-08-16 + - + + 2022-08-17 + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low Harshvardhan J. Pandit + 0.14,xsd:decimal - + - 2022-08-17 - Unauthorised Data Disclosure - Unauthorised Data Disclosure accepted - - + - - accepted - + + - Harshvardhan J. Pandit - - Scam - Scam + 0.31,xsd:decimal 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + accepted + High Risk (RM7x7 S:3 L:5) - - - Harshvardhan J. Pandit + + + + + Harshvardhan J. Pandit + 2022-08-18 + 5 Likelihood Levels - Status associated with an incident accepted - 2024-02-14 - - Incident Status - + Scale with 5 Likelihood Levels from Very High to Very Low + - - - - Incident where the availability of information or system has been affected + + 0.24,xsd:decimal - 2024-05-19 accepted - - Availability Incident - - - Copyright Violation + Moderate Risk (RM7x7 S:3 L:4) + Harshvardhan J. Pandit 2022-08-17 - + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + - accepted - Harshvardhan J. Pandit - - - Copyright Violation - + - + + Harshvardhan J. Pandit + accepted - + - - Harshvardhan J. Pandit - Unauthorised Code Access 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Moderate Risk (RM5x5 S:2 L:3) + 0.24,xsd:decimal - Unauthorised Code Access - accepted - + - + - accepted - 7 Likelihood Levels - + High Risk (RM7x7 S:4 L:4) + 0.33,xsd:decimal + - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - 2022-08-18 + accepted + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - - - + + Incident Identifier - - - exploits vulnerability - - Indicates the threat (subject) exploits the indicated vulnerability (object) + Identifier associated with an incident + + accepted - 2024-02-14 + 2024-05-19 + - - ENISA Reference Incident Classification Taxonomy 2018 + - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + 2024-08-16 2022-08-17 - + Phishing Scam + Something that acts as or causes Phishing Scam + + - accepted - + Harshvardhan J. Pandit - Remote Spying - Remote Spying - - + accepted + - - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Security Breach + - accepted - 0.18,xsd:decimal Harshvardhan J. Pandit - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - Low Risk (RM7x7 S:3 L:3) - + Something that acts as or causes Security Breach + 2024-08-16 + + accepted + + - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - + + Control that modifies risk + Risk Control - 2024-05-19 + accepted - Control that removes Consequence i.e. prevents it from materialising - Harshvardhan J. Pandit - Remove Consequence - + 2024-05-19 + + - - Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + + - 2024-02-14 - - - caused by vulnerability accepted - - + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - Harshvardhan J. Pandit + + - - Personal Safety Endangerment - 2022-08-17 - - Personal Safety Endangerment + Financial Loss + + Harshvardhan J. Pandit accepted - + 2024-08-16 + 2022-08-17 + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + - + + 0.25,xsd:decimal + 2022-08-18 + Low Likelihood + + - - + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 Harshvardhan J. Pandit - 2022-08-17 - accepted - Identity Theft - Identity Theft - + Level where Likelihood is Low + + + - + + - - accepted - Unwanted Data Deletion - - Harshvardhan J. Pandit - 2022-08-17 - Unwanted Data Deletion - - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 - + accepted + Internal Security Threat + Concepts associated with security threats and issues that originate within the organisation + - - 0.75,xsd:decimal + accepted - + - 2022-08-18 - High Likelihood + 2022-08-17 + Something that acts as or causes a compromised account that is then used by the compromiser Harshvardhan J. Pandit + 2024-08-16 + Compromise Account - Level where Likelihood is High - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - - - + + - + + Something that acts as or causes Malware Attack + 2024-08-16 + + + Malware Attack + accepted - + - accepted - Spying - Spying Harshvardhan J. Pandit - - 2022-08-17 - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + + 2024-08-16 + + Something that acts as or causes Unwanted Code Deletion + Unwanted Code Deletion Harshvardhan J. Pandit + accepted + - 2022-08-17 + + + + + + + + Something that acts as or causes Loss of Trust - Compromise Account Security + + Lose of Trust + Harshvardhan J. Pandit + 2022-08-17 accepted - Compromise Account Security - + 2024-08-16 + - + + + + Risk Concepts - N3 serialiation + + + + + + Harshvardhan J. Pandit accepted - - Cross-Border Incident + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + 0.43,xsd:decimal + + - Incident involving cross-border or multiple jurisdictions - - 2024-05-19 + High Risk (RM7x7 S:7 L:3) + - - + + + - + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + Very High Risk (RM5x5 S:5 L:5) + 2022-08-17 + 0.99,xsd:decimal + Harshvardhan J. Pandit accepted + + + + Lose of Reputation Harshvardhan J. Pandit - Unauthorised Impersonation - Unauthorised Impersonation + + + + Something that acts as or causes Loss of Reputation + 2022-08-17 - + accepted + 2024-08-16 + - - - - - Risk Concepts - JSON-LD serialiation - - + + Harshvardhan J. Pandit + + + + 2022-08-17 + Low Risk (RM7x7 S:2 L:4) + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + accepted + 0.16,xsd:decimal + - + + Harshvardhan J. Pandit - + + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - Discrimination - Discrimination - 2022-08-19 + 0.5,xsd:decimal + Level where Likelihood is Moderate + 2022-08-18 accepted - Georg P. Krog - + Moderate Likelihood + + + - 0.06,xsd:decimal Harshvardhan J. Pandit + accepted - - 2022-08-17 - accepted Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + 0.06,xsd:decimal Extremely Low Risk (RM7x7 S:3 L:1) - - - - Harshvardhan J. Pandit - - - 2022-08-17 - - Health and life impact - Health and life impact - accepted - + - - Cryptojacking - 2022-08-17 - + + + accepted - - Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 2022-08-17 Harshvardhan J. Pandit - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - + Moderate Risk (RM5x5 S:4 L:2) + 0.32,xsd:decimal + - - + + 2022-08-17 + + 2024-08-16 + accepted + - accepted - - Harmful Speech - Harmful Speech Harshvardhan J. Pandit - - 2022-08-17 - + Something that acts as or causes Physical Assault + + Physical Assault + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - Monitor Control - - 2024-05-19 - - - - accepted - Risk Mitigation Measure that uses controls to monitor events - Harshvardhan J. Pandit - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - - accepted - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Harshvardhan J. Pandit - Harshvardhan J. Pandit - Risk Matrix 5x5 + Moderate Risk (RM7x7 S:2 L:6) + 0.24,xsd:decimal + accepted 2022-08-17 - + - - - Payment - + + - 2024-04-14 + Control that changes Impact + Change Impact + accepted - Georg P. Krog, Harshvardhan J. Pandit - Payment provided as compensation (as an impact) - + 2024-05-19 + Harshvardhan J. Pandit + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + + + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + accepted + 2024-02-14 + exploits vulnerability + + + + + - Harshvardhan J. Pandit + 2024-08-16 + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + Harshvardhan J. Pandit 2022-08-17 - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate accepted - 0.31,xsd:decimal - + Brute Force Authorisations + + - + - Identification Control - Control to identify characteristics of event - accepted + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Harshvardhan J. Pandit 2024-05-19 + Share Risk + - - Loss of Suppliers - Loss of Suppliers - - - - Harshvardhan J. Pandit - - 2022-08-17 - - accepted - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - Examples for Data Privacy Vocabulary - - - - - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + Societal Health & Safety + accepted + - - Damage - Harshvardhan J. Pandit - 2022-03-30 - accepted - Impact that acts as or causes damages - + - - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + + This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 - + Something that acts as or causes Harmful Speech + 2024-08-16 + accepted + - accepted - Risk Matrix 3x3 - Harshvardhan J. Pandit + Exposure to Harmful Speech - + Harshvardhan J. Pandit + + - - Incident where the integrity of information or system has been affected - Integrity Incident + + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + DGA 2.10 + modified + + + Fee + Something that acts as or provides fees e.g. for using a service + 2024-08-16 + + + + Harshvardhan J. Pandit accepted 2024-05-19 - + + + + Monitor Risk Source + Control that monitors a Risk Source + - - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - Harshvardhan J. Pandit + + 2022-08-18 + - - 2022-08-17 + Harshvardhan J. Pandit + Scale with 5 Severity Levels from Very High to Very Low accepted - Low Risk (RM5x5 S:1 L:5) - 0.20,xsd:decimal - + 5 Severity Levels + - - + + Something that acts as or causes Scam + 2024-08-16 + accepted + 2022-08-17 + + + + Harshvardhan J. Pandit + Scam + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html + - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + Control to recover from event + Recovery Control + accepted + + 2024-05-19 + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High Harshvardhan J. Pandit + accepted - 2022-08-17 - 0.22,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - accepted - Low Risk (RM3x3 S:2 L:1) + 0.99,xsd:decimal + + High Risk (RM3x3 S:3 L:3) - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - Level where Risk is Very Low - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + - + - 2022-08-18 - Harshvardhan J. Pandit + 0.02,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - Very Low Risk - 0.1,xsd:decimal + Harshvardhan J. Pandit accepted - - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + 2022-08-17 + - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - 2022-08-17 + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 0.49,xsd:decimal + 2022-08-17 + Very High Risk (RM7x7 S:4 L:6) accepted - 0.12,xsd:decimal - + - Very Low Risk (RM7x7 S:1 L:6) Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 + + + + 2024-08-16 - Law Enforcement Adverse Effects - Law Enforcement Adverse Effects - + accepted + + Something that acts as or causes Account Credentials to be compromised + Compromise Account Credentials + - accepted - Harshvardhan J. Pandit 2022-08-17 - + - + + 2024-08-16 + 2022-08-17 + Harshvardhan J. Pandit - - 2024-05-19 - - - accepted - Control that reduces the likelihood of an event - Reduce Likelihood - - - - 2024-02-14 - + Extorsion + - accepted - Harshvardhan J. Pandit - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - + Something that acts as or causes Extorsion + - - Monitor Vulnerabilities - Harshvardhan J. Pandit - - - - Control that monitors a Risk Vulnerability + + Risk source event which causes Risk accepted - 2024-05-19 - - - - + + 2024-02-14 - 2022-08-18 - Harshvardhan J. Pandit - 7 Risk Levels + Threat + + - Scale with 7 Risk Levels from Extremely High to Extremely Low accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + 0.10,xsd:decimal - + - - 2024-05-19 - accepted - Control that monitors another Control + 2022-08-17 + Very Low Risk (RM7x7 S:5 L:1) Harshvardhan J. Pandit - Monitor Control - + - - 2022-08-17 + - - - - accepted - Sexual Violence - Sexual Violence - Harshvardhan J. Pandit - - - - 2024-05-19 + The criteria for what is considered material damage is based in jurisdictional laws and norms - + - accepted Harshvardhan J. Pandit - Control that avoids the risk source - Avoid Source - - + 2022-03-30 + Something that acts as or causes Material Damage + 2024-08-16 + Material Damage + - - - - - Cost of Operation Interruption - accepted - - Cost of Operation Interruption - Harshvardhan J. Pandit - 2022-08-17 + + Risk Analysis - - - - Incident Suspected Report + + accepted - - A report describing the suspicion of an incident in the past or occuring - - 2024-05-19 - accepted + Harshvardhan J. Pandit + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + 2022-08-18 - + ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + + + Moderate Risk (RM7x7 S:5 L:3) + - accepted - Loss of Reputation - - Loss of Reputation Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 0.31,xsd:decimal 2022-08-17 - - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + accepted + - + accepted + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low Harshvardhan J. Pandit + 0.08,xsd:decimal - 0.32,xsd:decimal - 2022-08-17 - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - + Extremely Low Risk (RM7x7 S:4 L:1) + - - 2022-08-17 + + Scale with 7 Risk Levels from Extremely High to Extremely Low - 0.02,xsd:decimal - + 7 Risk Levels + Harshvardhan J. Pandit + accepted + - accepted - Extremely Low Risk (RM7x7 S:1 L:1) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - + 2022-08-18 + - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + accepted + Indicates the cause of associated context (subject) was the indicated threat (object) + + + + 2024-02-14 + caused by threat - - + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + + Moderate Risk (RM7x7 S:2 L:7) Harshvardhan J. Pandit - Extremely Low Severity + 0.29,xsd:decimal - 2022-08-18 - Level where Severity is Extremely Low - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 0.01,xsd:decimal accepted - + - + + Low Risk (RM5x5 S:4 L:1) + + + + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Harshvardhan J. Pandit + 0.16,xsd:decimal + accepted + + + + 2024-05-19 - Risk Mitigation Measure that controls Impacts + Incident Assessment Report + - + A report describing the assessment of an incident in terms of its effects or impacts accepted - Impact Control - Harshvardhan J. Pandit - - - + + 2022-08-17 + - accepted - 0.04,xsd:decimal - Extremely Low Risk (RM7x7 S:1 L:2) Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.57,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + Very High Risk (RM7x7 S:4 L:7) - 2022-08-17 + accepted - - - - - Cost of Acquisition - Cost of Acquisition + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + 2024-08-16 2022-08-17 - - - accepted + Violating Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 Harshvardhan J. Pandit - - - - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - + modified + Something that acts as or causes Violation of Ethics Code + - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:6 L:7) - 2022-08-17 - 0.86,xsd:decimal + + + + + Harshvardhan J. Pandit accepted - - - - + - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:7 L:6) - + 0.16,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + Low Risk (RM5x5 S:2 L:2) 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - 0.86,xsd:decimal - accepted - + - - + + + accepted + 3 Risk Levels + Harshvardhan J. Pandit + Scale with 3 Risk Levels from High to Low 2022-08-18 - Prevent Exercising of Rights - Georg P. Krog, Harshvardhan J. Pandit - Prevent Exercising of Rights - - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - - - - - - Risk Concepts - HTML serialiation - + 2022-08-17 - High Risk (RM7x7 S:4 L:4) - + 0.08,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:2) + accepted + - accepted - Harshvardhan J. Pandit - 0.33,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + Harshvardhan J. Pandit - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - + 2024-05-19 - Incident Preliminary Report - + + accepted - accepted - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + Deliberate Incident + Incident caused due to deliberate actions of a human - - Harshvardhan J. Pandit - - - - Moderate Risk (RM7x7 S:6 L:2) + + Vulnerability + 2024-02-14 + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - 2022-08-17 accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - 0.24,xsd:decimal - + + + - - Harshvardhan J. Pandit - 0.08,xsd:decimal - + + accepted + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - 2022-08-17 - Very Low Risk (RM7x7 S:1 L:4) - accepted - + Intentional Misuse + Intentional Misuse + - - + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + Extremely High Risk (RM7x7 S:7 L:6) + - Low Risk (RM7x7 S:2 L:5) Harshvardhan J. Pandit - 0.20,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 2022-08-17 - accepted + 2022-08-17 + 0.86,xsd:decimal - - - - is vulnerability of - - 2024-02-14 - - Indicates the vulnerability (subject) is associated with indicated context (object) - - accepted - - - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 + + + + 0.40,xsd:decimal + Harshvardhan J. Pandit + + + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + High Risk (RM5x5 S:5 L:2) - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low accepted - + 2022-08-17 + + + + 2022-08-18 + - 2022-08-18 + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 0.99,xsd:decimal + Level where Risk is Extremely High + + accepted + Extremely High Risk Harshvardhan J. Pandit - + - - + + 0.1,xsd:decimal + 2022-08-18 + - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:5 L:6) - 2022-08-17 - 0.61,xsd:decimal + Very Low Risk accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - - + Level where Risk is Very Low Harshvardhan J. Pandit - + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + + + + + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 2022-08-17 - 0.51,xsd:decimal accepted - Very High Risk (RM7x7 S:5 L:5) - + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + - - - Harshvardhan J. Pandit + + - - Loss of Negotiating Capacity - Loss of Negotiating Capacity + Public Order Breach + + Harshvardhan J. Pandit + accepted + 2024-08-16 2022-08-17 + Something that acts as or causes Public Order Breach - accepted - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + - - ISO/IEC 27005:2018 + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - https://www.iso.org/standard/75281.html - - Harshvardhan J. Pandit - - - - 0.14,xsd:decimal + - 2022-08-17 + Operational Security Risk accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - Low Risk (RM7x7 S:1 L:7) - + + + + Risks and issues that arise during operational processes + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - ISO/IEC 27005:2018 + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - + + Harshvardhan J. Pandit + 2024-08-16 + Something that acts as or causes Unauthorised Data Disclosure + Unauthorised Data Disclosure + - - 2022-08-17 + accepted - High Risk (RM7x7 S:7 L:3) - 0.43,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - Harshvardhan J. Pandit - + 2022-08-17 + - + + Control that removes Impact i.e. prevents it from materialising accepted + 2024-05-19 + - Documented information about an incident, its handling, assessments,and notifications - - Incident Report + Harshvardhan J. Pandit + Remove Impact - 2024-05-19 + - - accepted - - - - Indicates the cause of associated context (subject) was the indicated threat (object) - + - 2024-02-14 - caused by threat - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + accepted + 2022-08-17 + 0.16,xsd:decimal + + + + Harshvardhan J. Pandit + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments - - ISO/IEC 27005:2018 + - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Harshvardhan J. Pandit + + accepted + High Risk (RM5x5 S:2 L:5) + 0.40,xsd:decimal + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + accepted + Incident Report + + + + 2024-05-19 + Documented information about an incident, its handling, assessments,and notifications - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - ENISA Threat Landscape 2021 + + + Risk Concepts - HTML serialiation + + + + - + - ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 + - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ISO/IEC 27005:2018 - + https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + Risks and issues that have their basis in legal requirements and enforcement + Legal Risk + accepted + + + + - + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + + Harshvardhan J. Pandit + accepted + + + + + 2024-05-19 + Monitor Risk + Control that monitors a Risk + + + + + Integrity Incident + + + + Incident where the integrity of information or system has been affected + accepted + 2024-05-19 + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.iso.org/standard/75281.html - ENISA Methodology for Sectoral Cybersecurity Assessments - - - Guides for Data Privacy Vocabulary - - - - - + ISO/IEC 27005:2018 - + 2022-08-18 + 0.99,xsd:decimal + - 2022-08-18 - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Harshvardhan J. Pandit accepted - Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Extremely High Severity - 0.99,xsd:decimal Level where Severity is Extremely High - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + Incident Ongoing Report + + accepted + + + + 2024-05-19 + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + accepted + 2024-05-19 + + + + + Monitor Consequence + Control that monitors a Risk Consequence + Harshvardhan J. Pandit + - - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + Harshvardhan J. Pandit + High Risk (RM5x5 S:5 L:3) + + + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal + accepted + 2022-08-17 + - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - - - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + Privacy + accepted + - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + Harshvardhan J. Pandit + A register recording incidentes, their reports, notifications, and other related activities + accepted + 2024-05-19 + + + Incident Register - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - + + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Methodology for Sectoral Cybersecurity Assessments + ENISA Reference Incident Classification Taxonomy 2018 - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment diff --git a/2.1-dev/risk/risk-owl.ttl b/2.1-dev/risk/risk-owl.ttl index a1c235ecf..f2342f89c 100644 --- a/2.1-dev/risk/risk-owl.ttl +++ b/2.1-dev/risk/risk-owl.ttl @@ -115,20 +115,6 @@ risk-owl:7SeverityLevels a rdfs:Class, skos:definition "Scale with 7 Severity Levels from Extremely High to Extremely Low"@en ; skos:prefLabel "7 Severity Levels"@en . -risk-owl:AbusiveContentUtilisation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Abusive Content Utilisation"@en ; - skos:prefLabel "Abusive Content Utilisation"@en . - risk-owl:AccidentalIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -138,34 +124,37 @@ risk-owl:AccidentalIncident a rdfs:Class, skos:definition "Incident caused due to accidental actions arising from human or human-controlled situations"@en ; skos:prefLabel "Accidental Incident"@en . -risk-owl:AttackonPrivateLife a rdfs:Class, +risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Attack on Private Life"@en ; - skos:prefLabel "Attack on Private Life"@en . + skos:definition "Accidental Misuse"@en ; + skos:prefLabel "Accidental Misuse"@en . risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Authorisation Failure"@en ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . +risk-owl:AvailabilityBreach a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + risk-owl:AvailabilityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -188,85 +177,46 @@ risk-owl:AvoidSource a rdfs:Class, risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Blackmail"@en ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Brute Force Authorisations"@en ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . -risk-owl:BusinessImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Business impact"@en ; - skos:prefLabel "Business impact"@en . - -risk-owl:BusinessPerformanceImpairment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business Performance Impairment"@en ; - skos:prefLabel "Business Performance Impairment"@en . - -risk-owl:Businessdisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Business disruption"@en ; - skos:prefLabel "Business disruption"@en . - risk-owl:ChangeConsequence a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -289,127 +239,96 @@ risk-owl:ChangeImpact a rdfs:Class, skos:definition "Control that changes Impact"@en ; skos:prefLabel "Change Impact"@en . -risk-owl:ChildViolence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Child Violence"@en ; - skos:prefLabel "Child Violence"@en . - -risk-owl:CitizensImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Citizens impact"@en ; - skos:prefLabel "Citizens impact"@en . - risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Coercion"@en ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Benefit ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . -risk-owl:ComplianceImpact a rdfs:Class, +risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compliance impact"@en ; - skos:prefLabel "Compliance impact"@en . + skos:definition "Something that acts as or causes Component Failure"@en ; + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccount a rdfs:Class, +risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account"@en ; - skos:prefLabel "Compromise Account"@en . + skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk-owl:CompromiseAccountCredentials a rdfs:Class, +risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Credentials"@en ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:prefLabel "Compromise Account"@en . -risk-owl:CompromiseAccountSecurity a rdfs:Class, +risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Compromise Account Security"@en ; - skos:prefLabel "Compromise Account Security"@en . + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Confidentiality Breach"@en ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . risk-owl:ConfidentialityIncident a rdfs:Class, @@ -432,28 +351,6 @@ risk-owl:ConsequenceControl a rdfs:Class, skos:definition "Risk Mitigation Measure that controls the Consequences"@en ; skos:prefLabel "Consequence Control"@en . -risk-owl:ConsequenceForDataSubject a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence for Data Subject"@en ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk-owl:ConsequenceOnDataSecurity a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Consequence on Data Security"@en ; - skos:prefLabel "Consequence on Data Security"@en . - risk-owl:ContainmentControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -466,144 +363,19 @@ risk-owl:ContainmentControl a rdfs:Class, risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Copyright Violation"@en ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . -risk-owl:CorruptionData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Corruption of Data"@en ; - skos:prefLabel "Corruption of Data"@en . - -risk-owl:CostAcquisition a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Acquisition"@en ; - skos:prefLabel "Cost of Acquisition"@en . - -risk-owl:CostBackup a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Backup"@en ; - skos:prefLabel "Cost of Backup"@en . - -risk-owl:CostConfiguration a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Configuration"@en ; - skos:prefLabel "Cost of Configuration"@en . - -risk-owl:CostInstallation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Installation"@en ; - skos:prefLabel "Cost of Installation"@en . - -risk-owl:CostJudicialPenalties a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk-owl:CostJudicialProceedings a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk-owl:CostOperationInterruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Operation Interruption"@en ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk-owl:CostSuspendedOperations a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Cost of Suspended Operations"@en ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk-owl:CrossBorderIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -615,114 +387,63 @@ risk-owl:CrossBorderIncident a rdfs:Class, risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . -risk-owl:CyberSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Spying"@en ; - skos:prefLabel "Cyber Spying"@en . - -risk-owl:CyberStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Cyber Stalking"@en ; - skos:prefLabel "Cyber Stalking"@en . - risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . -risk-owl:DamageByThirdParty a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Damage by Third Party"@en ; - skos:prefLabel "Damage by Third Party"@en . - -risk-owl:DangertoCustomers a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Danger to Customers"@en ; - skos:prefLabel "Danger to Customers"@en . - -risk-owl:DangertoPersonnel a rdfs:Class, +risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex-owl:E0069, + dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Danger to Personnel"@en ; - skos:prefLabel "Danger to Personnel"@en . + skos:definition "Something that acts as or causes Data Breach"@en ; + skos:prefLabel "Data Breach"@en . -risk-owl:DataBreach a rdfs:Class, +risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex-owl:E0069, - dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Data Breach"@en ; - skos:prefLabel "Data Breach"@en . + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk-owl:DeliberateIncident a rdfs:Class, owl:Class ; @@ -735,16 +456,20 @@ risk-owl:DeliberateIncident a rdfs:Class, risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:DetectionControl a rdfs:Class, @@ -759,79 +484,43 @@ risk-owl:DetectionControl a rdfs:Class, risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . -risk-owl:DetrimentToRecovery a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Detriment to Recovery"@en ; - skos:prefLabel "Detriment to Recovery"@en . - risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Discrimination"@en ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk-owl:Eavesdropping a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Eavesdropping"@en ; - skos:prefLabel "Eavesdropping"@en . - -risk-owl:EconomicDisadvantage a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Economic Disadvantage"@en ; - skos:prefLabel "Economic Disadvantage"@en . - risk-owl:EnvironmentalIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -841,74 +530,100 @@ risk-owl:EnvironmentalIncident a rdfs:Class, skos:definition "Incident caused due to environmental factors outside human controls"@en ; skos:prefLabel "Environmental Incident"@en . -risk-owl:EnvironmentalSafetyEndangerment a rdfs:Class, +risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Environmental Safety Endangerment"@en ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; + skos:prefLabel "Environmental Risk"@en . risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Equipment Failure"@en ; - skos:prefLabel "Equipment Failure"@en . + skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Equipment Malfunction"@en ; - skos:prefLabel "Equipment Malfunction"@en . + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Erroneous System Use"@en ; + skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:prefLabel "Erroneous System Use"@en . +risk-owl:ExposureToHarmfulSpeech a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk-owl:ExternalSecurityThreat a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:prefLabel "External Security Threat"@en . + risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Extorsion"@en ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:ExtremelyHighLikelihood a rdfs:Class, @@ -991,114 +706,56 @@ risk-owl:ExtremelyLowSeverity a rdfs:Class, risk-owl:Fee a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; - sw:term_status "accepted"@en ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + rdfs:subClassOf risk-owl:FinancialImpact ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:prefLabel "Fee"@en . -risk-owl:FinancialEquipmentCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Equipment Costs"@en ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk-owl:FinancialInvestigationCosts a rdfs:Class, +risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Financial Investigation Costs"@en ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:definition "Things that cause or have the potential to impact financial resources"@en ; + skos:prefLabel "Financial Impact"@en . risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Financial Loss"@en ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . -risk-owl:FinancialPersonnelCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Personnel Costs"@en ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk-owl:FinancialRepairCosts a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Financial Repair Costs"@en ; - skos:prefLabel "Financial Repair Costs"@en . - risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Fraud"@en ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . -risk-owl:GovernmentCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Government Crisis"@en ; - skos:prefLabel "Government Crisis"@en . - risk-owl:HaltSource a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -1112,42 +769,16 @@ risk-owl:HaltSource a rdfs:Class, risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes harms"@en ; - skos:prefLabel "Harm"@en . - -risk-owl:HarmfulSpeech a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; - sw:term_status "accepted"@en ; - skos:definition "Harmful Speech"@en ; - skos:prefLabel "Harmful Speech"@en . - -risk-owl:HealthLifeImpact a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Health and life impact"@en ; - skos:prefLabel "Health and life impact"@en . + skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk-owl:HighLikelihood a rdfs:Class, owl:Class, @@ -1196,16 +827,17 @@ risk-owl:HighSeverity a rdfs:Class, risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Human Errors"@en ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:prefLabel "Human Errors"@en . risk-owl:IdentificationControl a rdfs:Class, @@ -1218,58 +850,51 @@ risk-owl:IdentificationControl a rdfs:Class, skos:definition "Control to identify characteristics of event"@en ; skos:prefLabel "Identification Control"@en . -risk-owl:IdentityDispute a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Identity Dispute"@en ; - skos:prefLabel "Identity Dispute"@en . - risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Fraud"@en ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Identity Theft"@en ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . -risk-owl:IllegalProcessingData a rdfs:Class, +risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Illegal Processing of Data"@en ; - skos:prefLabel "Illegal Processing of Data"@en . + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . risk-owl:ImpactControl a rdfs:Class, owl:Class, @@ -1282,40 +907,17 @@ risk-owl:ImpactControl a rdfs:Class, skos:definition "Risk Mitigation Measure that controls Impacts"@en ; skos:prefLabel "Impact Control"@en . -risk-owl:ImpactOnDataSubject a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact on Data Subject"@en ; - skos:prefLabel "Impact on Data Subject"@en . - -risk-owl:ImpactToRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; - sw:term_status "accepted"@en ; - skos:definition "Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en . - risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date, "2024-05-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex-owl:E0069, dex-owl:E0070 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf rdfs:Class, + dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "An actual or occured event"@en ; skos:prefLabel "Incident"@en ; @@ -1539,48 +1141,43 @@ risk-owl:IncidentTerminated a rdfs:Class, skos:definition "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring"@en ; skos:prefLabel "Incident Terminated"@en . -risk-owl:IncreaseInternalCost a rdfs:Class, +risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Increase Internal Cost"@en ; - skos:prefLabel "Increase Internal Cost"@en . + skos:prefLabel "Individual Health & Safety"@en . -risk-owl:IndustrialCrisis a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk-owl:IndividualRisk a rdfs:Class, + owl:Class ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; sw:term_status "accepted"@en ; - skos:definition "Industrial Crisis"@en ; - skos:prefLabel "Industrial Crisis"@en . + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; + skos:prefLabel "Individual Risk"@en . risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Injury"@en ; + skos:definition "Something that acts as or causes Injury"@en ; skos:prefLabel "Injury"@en . +risk-owl:IntegrityBreach a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBreach ; + sw:term_status "accepted"@en . + risk-owl:IntegrityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -1590,321 +1187,171 @@ risk-owl:IntegrityIncident a rdfs:Class, skos:definition "Incident where the integrity of information or system has been affected"@en ; skos:prefLabel "Integrity Incident"@en . -risk-owl:InterceptionCommunications a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Interception of Communications"@en ; - skos:prefLabel "Interception of Communications"@en . - -risk-owl:InternalOperationDisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Internal Operation Disruption"@en ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk-owl:KnownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk-owl:LawEnforcementAdverseEffects a rdfs:Class, +risk-owl:IntentionalMisuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . - -risk-owl:LimitationOfRights a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Limitation of Rights"@en ; - skos:prefLabel "Limitation of Rights"@en . + skos:definition "Intentional Misuse"@en ; + skos:prefLabel "Intentional Misuse"@en . -risk-owl:LossAssets a rdfs:Class, +risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Assets"@en ; - skos:prefLabel "Loss of Assets"@en . - -risk-owl:LossCompetitiveAdvantage a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:prefLabel "Loss of Competitive Advantage"@en . + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:LossControlOverData a rdfs:Class, +risk-owl:InternalSecurityThreat a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Control over Data"@en ; - skos:prefLabel "Loss of Control over Data"@en . + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; + skos:prefLabel "Internal Security Threat"@en . -risk-owl:LossCredibility a rdfs:Class, +risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Credibility"@en ; - skos:prefLabel "Loss of Credibility"@en . - -risk-owl:LossCustomerConfidence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Customer Confidence"@en ; - skos:prefLabel "Loss of Customer Confidence"@en . - -risk-owl:LossCustomers a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Customers"@en ; - skos:prefLabel "Loss of Customers"@en . - -risk-owl:LossData a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Data"@en ; - skos:prefLabel "Loss of Data"@en . - -risk-owl:LossFunds a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Funds"@en ; - skos:prefLabel "Loss of Funds"@en . - -risk-owl:LossGoods a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Loss of Goods"@en ; - skos:prefLabel "Loss of Goods"@en . - -risk-owl:LossGoodwill a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Loss of Goodwill"@en ; - skos:prefLabel "Loss of Goodwill"@en . + skos:definition "Something that involves or causes judicial costs to be paid"@en ; + skos:prefLabel "Judicial Costs"@en . -risk-owl:LossNegotiatingCapacity a rdfs:Class, +risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:FinancialImpact ; + sw:term_status "accepted"@en ; + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; + skos:prefLabel "Judicial Penalty"@en . + +risk-owl:LegalRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Loss of Negotiating Capacity"@en ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:prefLabel "Legal Risk"@en . -risk-owl:LossOpportunity a rdfs:Class, +risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Opportunity"@en ; - skos:prefLabel "Loss of Opportunity"@en . + skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:prefLabel "Lose of Credibility"@en . -risk-owl:LossProprietaryInformation a rdfs:Class, +risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Proprietary Information"@en ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:prefLabel "Lose of Customer Confidence"@en . -risk-owl:LossReputation a rdfs:Class, +risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Reputation"@en ; - skos:prefLabel "Loss of Reputation"@en . + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:prefLabel "Lose of Goodwill"@en . -risk-owl:LossResources a rdfs:Class, +risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Resources"@en ; - skos:prefLabel "Loss of Resources"@en . + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk-owl:LossSuppliers a rdfs:Class, +risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Suppliers"@en ; - skos:prefLabel "Loss of Suppliers"@en . + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:prefLabel "Lose of Opportunity"@en . -risk-owl:LossTechnologicalAdvantage a rdfs:Class, +risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Technological Advantage"@en ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:prefLabel "Lose of Reputation"@en . -risk-owl:LossTrust a rdfs:Class, +risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Loss of Trust"@en ; - skos:prefLabel "Loss of Trust"@en . + skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:prefLabel "Lose of Trust"@en . risk-owl:LowLikelihood a rdfs:Class, owl:Class, @@ -1953,82 +1400,59 @@ risk-owl:LowSeverity a rdfs:Class, risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:prefLabel "Material Damage"@en . - -risk-owl:MisinformationDisinformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:definition "Something that acts as or causes Material Damage"@en ; + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Misuse"@en ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:prefLabel "Misuse"@en . -risk-owl:MisuseBreachedInformation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Misuse of Breached Information"@en ; - skos:prefLabel "Misuse of Breached Information"@en . - risk-owl:ModerateLikelihood a rdfs:Class, owl:Class, dpv-owl:Likelihood ; @@ -2154,175 +1578,127 @@ risk-owl:MonitorVulnerabilities a rdfs:Class, risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Impact that acts as or causes non-material damages"@en ; - skos:prefLabel "Non-Material Damage"@en . + skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk-owl:OrganisationDisruption a rdfs:Class, +risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Organisation Disruption"@en ; - skos:prefLabel "Organisation Disruption"@en . + skos:definition "Risks and issues that arise during operational processes"@en ; + skos:prefLabel "Operational Security Risk"@en . risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Personal Safety Endangerment"@en ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . -risk-owl:PersonnelAbsence a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Personnel Absence"@en ; - skos:prefLabel "Personnel Absence"@en . - risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Physical Assault"@en ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . -risk-owl:PhysicalSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Spying"@en ; - skos:prefLabel "Physical Spying"@en . - -risk-owl:PhysicalStalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Physical Stalking"@en ; - skos:prefLabel "Physical Stalking"@en . - -risk-owl:PreventExercisingOfRights a rdfs:Class, +risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Prevent Exercising of Rights"@en ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk-owl:PrivacyImpact a rdfs:Class, +risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Privacy impact"@en ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Psychological Harm"@en ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Public Order Breach"@en ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . risk-owl:RM3x3S1L1 a rdfs:Class, @@ -3321,23 +2697,6 @@ risk-owl:RM7x7S7L7 a rdfs:Class, skos:definition "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High"@en ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . -risk-owl:RansomwareAttack a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:prefLabel "Ransomware Attack"@en . - risk-owl:RecoveryControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -3382,14 +2741,16 @@ risk-owl:ReductionControl a rdfs:Class, risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Re-identification"@en ; - skos:prefLabel "Re-identification"@en . + skos:definition "Something that acts as or causes Re-identification"@en ; + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . risk-owl:RemedyControl a rdfs:Class, owl:Class, @@ -3401,20 +2762,6 @@ risk-owl:RemedyControl a rdfs:Class, skos:definition "Control to remedy consequences of event"@en ; skos:prefLabel "Remedy Control"@en . -risk-owl:RemoteSpying a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Remote Spying"@en ; - skos:prefLabel "Remote Spying"@en . - risk-owl:RemoveConsequence a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -3450,81 +2797,92 @@ risk-owl:RemoveSource a rdfs:Class, risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:prefLabel "Remuneration"@en . -risk-owl:ReplacementCosts a rdfs:Class, +risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; + skos:prefLabel "Reputational Risk"@en . + +risk-owl:Reward a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Replacement Costs"@en ; - skos:prefLabel "Replacement Costs"@en . + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; + skos:prefLabel "Reward"@en . -risk-owl:ReputationTrustImpact a rdfs:Class, +risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Reputation and trust impact"@en ; - skos:prefLabel "Reputation and trust impact"@en . + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk-owl:RetrievalDeletedData a rdfs:Class, +risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf dpv-owl:Impact, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Deleted Data"@en ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk-owl:RetrievalDiscardedEquipment a rdfs:Class, +risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Retrieval of Discarded Equipment"@en ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . -risk-owl:Reward a rdfs:Class, +risk-owl:RightsViolation a rdfs:Class, owl:Class, - dpv-owl:Impact ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Compensation ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Reward provided as compensation (as an impact)"@en ; - skos:prefLabel "Reward"@en . + skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk-owl:RiskAnalysis a rdfs:Class, owl:Class ; @@ -3619,80 +2977,80 @@ risk-owl:RiskMatrix7x7 a rdfs:Class, risk-owl:RiskSource a rdfs:Class, owl:Class ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:prefLabel "Risk Source"@en . risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Sabotage"@en ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Scam"@en ; + skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . -risk-owl:SecurityBreach a rdfs:Class, +risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Security Breach"@en ; - skos:prefLabel "Security Breach"@en . + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:prefLabel "Security Attack"@en . -risk-owl:ServiceInterruption a rdfs:Class, +risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Service Interruption"@en ; - skos:prefLabel "Service Interruption"@en . + skos:definition "Something that acts as or causes Security Breach"@en ; + skos:prefLabel "Security Breach"@en . risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Sexual Violence"@en ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:ShareRisk a rdfs:Class, @@ -3708,194 +3066,125 @@ risk-owl:ShareRisk a rdfs:Class, risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Risk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Social Disadvantage"@en ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . -risk-owl:SourceControl a rdfs:Class, +risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - risk-owl:RiskControl ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2024-05-19"^^xsd:date ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskControl ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Risk Mitigation Measure that controls the Source"@en ; - skos:prefLabel "Source Control"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk-owl:Spam a rdfs:Class, +risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Spam"@en ; - skos:prefLabel "Spam"@en . + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:prefLabel "Societal Risk"@en . -risk-owl:Spoofing a rdfs:Class, +risk-owl:SourceControl a rdfs:Class, owl:Class, - dpv-owl:Risk ; + risk-owl:RiskControl ; dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dct:created "2024-05-19"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:RiskControl ; sw:term_status "accepted"@en ; - skos:definition "Spoofing"@en ; - skos:prefLabel "Spoofing"@en . + skos:definition "Risk Mitigation Measure that controls the Source"@en ; + skos:prefLabel "Source Control"@en . -risk-owl:Spying a rdfs:Class, +risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Spying"@en ; - skos:prefLabel "Spying"@en . - -risk-owl:Stalking a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Stalking"@en ; - skos:prefLabel "Stalking"@en . + skos:definition "Something that acts as or causes Spoofing"@en ; + skos:prefLabel "Spoofing"@en . risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Failure"@en ; - skos:prefLabel "System Failure"@en . + skos:definition "Something that acts as or causes System Failure"@en ; + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "System Intrusion"@en ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "System Malfunction"@en ; - skos:prefLabel "System Malfunction"@en . + skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Terrorism"@en ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:prefLabel "Terrorism"@en . -risk-owl:Theft a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft"@en ; - skos:prefLabel "Theft"@en . - -risk-owl:TheftEquipment a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Equipment"@en ; - skos:prefLabel "Theft of Equipment"@en . - -risk-owl:TheftMedia a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:MaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Theft of Media"@en ; - skos:prefLabel "Theft of Media"@en . - -risk-owl:ThirdPartyOperationDisruption a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Third Party Operation Disruption"@en ; - skos:prefLabel "Third Party Operation Disruption"@en . - risk-owl:Threat a rdfs:Class, owl:Class ; dct:created "2024-02-14"^^xsd:date ; @@ -3916,252 +3205,243 @@ risk-owl:ThreatSource a rdfs:Class, risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Access to Premises"@en ; + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . +risk-owl:UnauthorisedActivity a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:prefLabel "Unauthorised Activity"@en . + risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Code Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Access"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Data Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . -risk-owl:UnauthorisedImpersonation a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:NonMaterialDamage ; - sw:term_status "accepted"@en ; - skos:definition "Unauthorised Impersonation"@en ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Reidentification ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised Resource Use"@en ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Access"@en ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unauthorised System Modification"@en ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . -risk-owl:UnknownVulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Code Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Data Deletion"@en ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk-owl:Vandalism a rdfs:Class, +risk-owl:UserRisks a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Vandalism"@en ; - skos:prefLabel "Vandalism"@en . + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; + skos:prefLabel "User Risks"@en . risk-owl:VeryHighLikelihood a rdfs:Class, owl:Class, @@ -4247,86 +3527,110 @@ risk-owl:VeryLowSeverity a rdfs:Class, skos:prefLabel "Very Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1"@en . -risk-owl:ViolationCodeConduct a rdfs:Class, +risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Code of Conduct"@en ; - skos:prefLabel "Violation of Code of Conduct"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk-owl:ViolationContractualObligations a rdfs:Class, +risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk-owl:ViolationEthicalCode a rdfs:Class, +risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Ethical Code"@en ; - skos:prefLabel "Violation of Ethical Code"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk-owl:ViolationOfRights a rdfs:Class, +risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv-owl:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . + +risk-owl:ViolatingPolicy a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Harm ; + rdfs:subClassOf risk-owl:LegalRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Rights"@en ; - skos:prefLabel "Violation of Rights"@en . + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:prefLabel "Violating Policy"@en . -risk-owl:ViolationRegulatoryObligations a rdfs:Class, +risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; - sw:term_status "accepted"@en ; - skos:definition "Violation of Regulatory Obligations"@en ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + rdfs:subClassOf risk-owl:LegalRisk ; + sw:term_status "modified"@en ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk-owl:ViolationStatutoryObligations a rdfs:Class, +risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Damage ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:definition "Something that acts as or causes Child Violence"@en ; + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk-owl:Vulnerability a rdfs:Class, owl:Class ; @@ -4339,32 +3643,19 @@ risk-owl:Vulnerability a rdfs:Class, risk-owl:VulnerabilityCreated a rdfs:Class, owl:Class, - dpv-owl:Risk ; + dpv-owl:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; + rdfs:subClassOf risk-owl:InternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Vulnerability Created"@en ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:prefLabel "Vulnerability Created"@en . -risk-owl:VulnerabilityExploited a rdfs:Class, - owl:Class, - dpv-owl:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Detriment ; - sw:term_status "accepted"@en ; - skos:definition "Vulnerability Exploited"@en ; - skos:prefLabel "Vulnerability Exploited"@en . - risk-owl:causedByThreat a rdf:Property, owl:ObjectProperty ; dcam:rangeIncludes risk-owl:Threat ; diff --git a/2.1-dev/risk/risk.csv b/2.1-dev/risk/risk.csv index dd4a9cf95..96ed050f9 100644 --- a/2.1-dev/risk/risk.csv +++ b/2.1-dev/risk/risk.csv @@ -1,359 +1,306 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -3LikelihoodLevels,class,https://w3id.org/dpv/risk#3LikelihoodLevels,3 Likelihood Levels,Scale with 3 Likelihood Levels from High to Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk -3RiskLevels,class,https://w3id.org/dpv/risk#3RiskLevels,3 Risk Levels,Scale with 3 Risk Levels from High to Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk -3SeverityLevels,class,https://w3id.org/dpv/risk#3SeverityLevels,3 Severity Levels,Scale with 3 Severity Levels from High to Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk -5LikelihoodLevels,class,https://w3id.org/dpv/risk#5LikelihoodLevels,5 Likelihood Levels,Scale with 5 Likelihood Levels from Very High to Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk -5RiskLevels,class,https://w3id.org/dpv/risk#5RiskLevels,5 Risk Levels,Scale with 5 Risk Levels from Very High to Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk -5SeverityLevels,class,https://w3id.org/dpv/risk#5SeverityLevels,5 Severity Levels,Scale with 5 Severity Levels from Very High to Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk -7LikelihoodLevels,class,https://w3id.org/dpv/risk#7LikelihoodLevels,7 Likelihood Levels,Scale with 7 Likelihood Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk -7RiskLevels,class,https://w3id.org/dpv/risk#7RiskLevels,7 Risk Levels,Scale with 7 Risk Levels from Extremely High to Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk -7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk -AbusiveContentUtilisation,class,https://w3id.org/dpv/risk#AbusiveContentUtilisation,Abusive Content Utilisation,Abusive Content Utilisation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -AttackonPrivateLife,class,https://w3id.org/dpv/risk#AttackonPrivateLife,Attack on Private Life,Attack on Private Life,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Authorisation Failure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Impact(s) that acts as or causes benefits,https://w3id.org/dpv#Impact,,https://w3id.org/dpv#Impact,,2022-03-23,,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Blackmail,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Brute Force Authorisations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -BusinessImpact,class,https://w3id.org/dpv/risk#BusinessImpact,Business impact,Business impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -BusinessPerformanceImpairment,class,https://w3id.org/dpv/risk#BusinessPerformanceImpairment,Business Performance Impairment,Business Performance Impairment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Businessdisruption,class,https://w3id.org/dpv/risk#Businessdisruption,Business disruption,Business disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ChildViolence,class,https://w3id.org/dpv/risk#ChildViolence,Child Violence,Child Violence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -CitizensImpact,class,https://w3id.org/dpv/risk#CitizensImpact,Citizens impact,Citizens impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Coercion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Compensation provided (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Benefit,,2024-04-14,,risk,https://w3id.org/dpv/risk -ComplianceImpact,class,https://w3id.org/dpv/risk#ComplianceImpact,Compliance impact,Compliance impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Compromise Account,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Compromise Account Credentials,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -CompromiseAccountSecurity,class,https://w3id.org/dpv/risk#CompromiseAccountSecurity,Compromise Account Security,Compromise Account Security,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Confidentiality Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ConsequenceForDataSubject,class,https://w3id.org/dpv/risk#ConsequenceForDataSubject,Consequence for Data Subject,Consequence for Data Subject,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-10-22,,risk,https://w3id.org/dpv/risk -ConsequenceOnDataSecurity,class,https://w3id.org/dpv/risk#ConsequenceOnDataSecurity,Consequence on Data Security,Consequence on Data Security,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-10-22,,risk,https://w3id.org/dpv/risk -ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Copyright Violation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -CorruptionData,class,https://w3id.org/dpv/risk#CorruptionData,Corruption of Data,Corruption of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostAcquisition,class,https://w3id.org/dpv/risk#CostAcquisition,Cost of Acquisition,Cost of Acquisition,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostBackup,class,https://w3id.org/dpv/risk#CostBackup,Cost of Backup,Cost of Backup,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostConfiguration,class,https://w3id.org/dpv/risk#CostConfiguration,Cost of Configuration,Cost of Configuration,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostInstallation,class,https://w3id.org/dpv/risk#CostInstallation,Cost of Installation,Cost of Installation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostJudicialPenalties,class,https://w3id.org/dpv/risk#CostJudicialPenalties,Cost of Judicial Penalties,Cost of Judicial Penalties,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostJudicialProceedings,class,https://w3id.org/dpv/risk#CostJudicialProceedings,Cost of Judicial Proceedings,Cost of Judicial Proceedings,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostOperationInterruption,class,https://w3id.org/dpv/risk#CostOperationInterruption,Cost of Operation Interruption,Cost of Operation Interruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CostSuspendedOperations,class,https://w3id.org/dpv/risk#CostSuspendedOperations,Cost of Suspended Operations,Cost of Suspended Operations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -CyberSpying,class,https://w3id.org/dpv/risk#CyberSpying,Cyber Spying,Cyber Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -CyberStalking,class,https://w3id.org/dpv/risk#CyberStalking,Cyber Stalking,Cyber Stalking,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Impact that acts as or causes damages,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-03-30,,risk,https://w3id.org/dpv/risk -DamageByThirdParty,class,https://w3id.org/dpv/risk#DamageByThirdParty,Damage by Third Party,Damage by Third Party,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -DangertoCustomers,class,https://w3id.org/dpv/risk#DangertoCustomers,Danger to Customers,Danger to Customers,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -DangertoPersonnel,class,https://w3id.org/dpv/risk#DangertoPersonnel,Danger to Personnel,Danger to Personnel,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Data Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Denial of Service Attack (DoS),https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Impact that acts as or causes detriments,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-03-23,,risk,https://w3id.org/dpv/risk -DetrimentToRecovery,class,https://w3id.org/dpv/risk#DetrimentToRecovery,Detriment to Recovery,Detriment to Recovery,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Discrimination,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-19,,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Eavesdropping,class,https://w3id.org/dpv/risk#Eavesdropping,Eavesdropping,Eavesdropping,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -EconomicDisadvantage,class,https://w3id.org/dpv/risk#EconomicDisadvantage,Economic Disadvantage,Economic Disadvantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-19,,risk,https://w3id.org/dpv/risk -EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -EnvironmentalSafetyEndangerment,class,https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment,Environmental Safety Endangerment,Environmental Safety Endangerment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Equipment Failure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Equipment Malfunction,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Erroneous System Use,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Extorsion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyLowLikelihood,class,https://w3id.org/dpv/risk#ExtremelyLowLikelihood,Extremely Low Likelihood,Level where Likelihood is Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyLowRisk,class,https://w3id.org/dpv/risk#ExtremelyLowRisk,Extremely Low Risk,Level where Risk is Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extremely Low Severity,Level where Severity is Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Fee provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -FinancialEquipmentCosts,class,https://w3id.org/dpv/risk#FinancialEquipmentCosts,Financial Equipment Costs,Financial Equipment Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialInvestigationCosts,class,https://w3id.org/dpv/risk#FinancialInvestigationCosts,Financial Investigation Costs,Financial Investigation Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Financial Loss,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialPersonnelCosts,class,https://w3id.org/dpv/risk#FinancialPersonnelCosts,Financial Personnel Costs,Financial Personnel Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -FinancialRepairCosts,class,https://w3id.org/dpv/risk#FinancialRepairCosts,Financial Repair Costs,Financial Repair Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Fraud,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -GovernmentCrisis,class,https://w3id.org/dpv/risk#GovernmentCrisis,Government Crisis,Government Crisis,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Impact that acts as or causes harms,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-13,,risk,https://w3id.org/dpv/risk -HarmfulSpeech,class,https://w3id.org/dpv/risk#HarmfulSpeech,Harmful Speech,Harmful Speech,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -HealthLifeImpact,class,https://w3id.org/dpv/risk#HealthLifeImpact,Health and life impact,Health and life impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Human Errors,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentityDispute,class,https://w3id.org/dpv/risk#IdentityDispute,Identity Dispute,Identity Dispute,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-24,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Identity Fraud,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Identity Theft,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -IllegalProcessingData,class,https://w3id.org/dpv/risk#IllegalProcessingData,Illegal Processing of Data,Illegal Processing of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ImpactOnDataSubject,class,https://w3id.org/dpv/risk#ImpactOnDataSubject,Impact on Data Subject,Impact on Data Subject,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-10-22,,risk,https://w3id.org/dpv/risk -ImpactToRights,class,https://w3id.org/dpv/risk#ImpactToRights,Impact to Rights,Impact to Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,,,Incident is realised or materialised risk,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentConcludingReport,class,https://w3id.org/dpv/risk#IncidentConcludingReport,Incident Concluding Report,A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentDetectionReport,class,https://w3id.org/dpv/risk#IncidentDetectionReport,Incident Detection Report,A report describing the detection of a Incident,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentHalted,class,https://w3id.org/dpv/risk#IncidentHalted,Incident Halted,The incident has halted or paused with a high likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentHandlingReport,class,https://w3id.org/dpv/risk#IncidentHandlingReport,Incident Handling Report,A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentIdentifier,class,https://w3id.org/dpv/risk#IncidentIdentifier,Incident Identifier,Identifier associated with an incident,,,,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentImpactAssessment,class,https://w3id.org/dpv/risk#IncidentImpactAssessment,Incident Impact Assessment,An impact assessment associated with a incident,,https://w3id.org/dpv#ImpactAssessment,https://w3id.org/dpv#ImpactAssessment,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentMitigated,class,https://w3id.org/dpv/risk#IncidentMitigated,Incident Mitigated,The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentMitigationMeasure,class,https://w3id.org/dpv/risk#IncidentMitigationMeasure,Incident Mitigation Measure,A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentNearMiss,class,https://w3id.org/dpv/risk#IncidentNearMiss,Incident Near Miss,"The state where an incident was almost successful in taking place i.e. ""it came very close""",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentNotice,class,https://w3id.org/dpv/risk#IncidentNotice,Incident Notice,Notice associated with an Incident,,https://w3id.org/dpv#Notice,https://w3id.org/dpv#Notice,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentOngoing,class,https://w3id.org/dpv/risk#IncidentOngoing,Incident Ongoing,The incident is ongoing i.e. still active,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentOngoingReport,class,https://w3id.org/dpv/risk#IncidentOngoingReport,Incident Ongoing Report,A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentPreliminaryReport,class,https://w3id.org/dpv/risk#IncidentPreliminaryReport,Incident Preliminary Report,A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentRegister,class,https://w3id.org/dpv/risk#IncidentRegister,Incident Register,"A register recording incidentes, their reports, notifications, and other related activities",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentReport,class,https://w3id.org/dpv/risk#IncidentReport,Incident Report,"Documented information about an incident, its handling, assessments,and notifications",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentStatus,class,https://w3id.org/dpv/risk#IncidentStatus,Incident Status,Status associated with an incident,,https://w3id.org/dpv#Status,https://w3id.org/dpv#Status,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentStatusUnknown,class,https://w3id.org/dpv/risk#IncidentStatusUnknown,Incident Status Unknown,The status of a incident is unknown,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentSuspected,class,https://w3id.org/dpv/risk#IncidentSuspected,Incident Suspected,"The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport,Incident Suspected Report,A report describing the suspicion of an incident in the past or occuring,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk -IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IncreaseInternalCost,class,https://w3id.org/dpv/risk#IncreaseInternalCost,Increase Internal Cost,Increase Internal Cost,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -IndustrialCrisis,class,https://w3id.org/dpv/risk#IndustrialCrisis,Industrial Crisis,Industrial Crisis,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Injury,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -InterceptionCommunications,class,https://w3id.org/dpv/risk#InterceptionCommunications,Interception of Communications,Interception of Communications,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -InternalOperationDisruption,class,https://w3id.org/dpv/risk#InternalOperationDisruption,Internal Operation Disruption,Internal Operation Disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -KnownVulnerabilityExploited,class,https://w3id.org/dpv/risk#KnownVulnerabilityExploited,Known Vulnerability Exploited,Known Vulnerability Exploited,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LawEnforcementAdverseEffects,class,https://w3id.org/dpv/risk#LawEnforcementAdverseEffects,Law Enforcement Adverse Effects,Law Enforcement Adverse Effects,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LimitationOfRights,class,https://w3id.org/dpv/risk#LimitationOfRights,Limitation of Rights,Limitation of Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-18,,risk,https://w3id.org/dpv/risk -LossAssets,class,https://w3id.org/dpv/risk#LossAssets,Loss of Assets,Loss of Assets,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossCompetitiveAdvantage,class,https://w3id.org/dpv/risk#LossCompetitiveAdvantage,Loss of Competitive Advantage,Loss of Competitive Advantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossControlOverData,class,https://w3id.org/dpv/risk#LossControlOverData,Loss of Control over Data,Loss of Control over Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-19,,risk,https://w3id.org/dpv/risk -LossCredibility,class,https://w3id.org/dpv/risk#LossCredibility,Loss of Credibility,Loss of Credibility,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossCustomerConfidence,class,https://w3id.org/dpv/risk#LossCustomerConfidence,Loss of Customer Confidence,Loss of Customer Confidence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossCustomers,class,https://w3id.org/dpv/risk#LossCustomers,Loss of Customers,Loss of Customers,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossData,class,https://w3id.org/dpv/risk#LossData,Loss of Data,Loss of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossFunds,class,https://w3id.org/dpv/risk#LossFunds,Loss of Funds,Loss of Funds,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossGoods,class,https://w3id.org/dpv/risk#LossGoods,Loss of Goods,Loss of Goods,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossGoodwill,class,https://w3id.org/dpv/risk#LossGoodwill,Loss of Goodwill,Loss of Goodwill,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossNegotiatingCapacity,class,https://w3id.org/dpv/risk#LossNegotiatingCapacity,Loss of Negotiating Capacity,Loss of Negotiating Capacity,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossOpportunity,class,https://w3id.org/dpv/risk#LossOpportunity,Loss of Opportunity,Loss of Opportunity,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossProprietaryInformation,class,https://w3id.org/dpv/risk#LossProprietaryInformation,Loss of Proprietary Information,Loss of Proprietary Information,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossReputation,class,https://w3id.org/dpv/risk#LossReputation,Loss of Reputation,Loss of Reputation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossResources,class,https://w3id.org/dpv/risk#LossResources,Loss of Resources,Loss of Resources,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossSuppliers,class,https://w3id.org/dpv/risk#LossSuppliers,Loss of Suppliers,Loss of Suppliers,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossTechnologicalAdvantage,class,https://w3id.org/dpv/risk#LossTechnologicalAdvantage,Loss of Technological Advantage,Loss of Technological Advantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -LossTrust,class,https://w3id.org/dpv/risk#LossTrust,Loss of Trust,Loss of Trust,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Intentional use of software by including or inserting in a system for a harmful purpose,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,"Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system",https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Impact that acts as or causes material damages,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-03-30,,risk,https://w3id.org/dpv/risk -MisinformationDisinformation,class,https://w3id.org/dpv/risk#MisinformationDisinformation,Misinformation and Disinformation,"Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)",https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Misuse,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2024-06-11,,risk,https://w3id.org/dpv/risk -MisuseBreachedInformation,class,https://w3id.org/dpv/risk#MisuseBreachedInformation,Misuse of Breached Information,Misuse of Breached Information,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorRisk,class,https://w3id.org/dpv/risk#MonitorRisk,Monitor Risk,Control that monitors a Risk,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Control,Control that monitors another Control,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Impact that acts as or causes non-material damages,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-03-30,,risk,https://w3id.org/dpv/risk -OrganisationDisruption,class,https://w3id.org/dpv/risk#OrganisationDisruption,Organisation Disruption,Organisation Disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Payment provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Personal Safety Endangerment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PersonnelAbsence,class,https://w3id.org/dpv/risk#PersonnelAbsence,Personnel Absence,Personnel Absence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,A type of social engineering attack involving deceptive messages intended to reveal sensitive information,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Physical Assault,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhysicalSpying,class,https://w3id.org/dpv/risk#PhysicalSpying,Physical Spying,Physical Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -PhysicalStalking,class,https://w3id.org/dpv/risk#PhysicalStalking,Physical Stalking,Physical Stalking,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -PreventExercisingOfRights,class,https://w3id.org/dpv/risk#PreventExercisingOfRights,Prevent Exercising of Rights,Prevent Exercising of Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-18,,risk,https://w3id.org/dpv/risk -PrivacyImpact,class,https://w3id.org/dpv/risk#PrivacyImpact,Privacy impact,Privacy impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Psychological Harm,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Public Order Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S1L1,class,https://w3id.org/dpv/risk#RM3x3S1L1,Low Risk (RM3x3 S:1 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S1L2,class,https://w3id.org/dpv/risk#RM3x3S1L2,Low Risk (RM3x3 S:1 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S1L3,class,https://w3id.org/dpv/risk#RM3x3S1L3,Moderate Risk (RM3x3 S:1 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S2L1,class,https://w3id.org/dpv/risk#RM3x3S2L1,Low Risk (RM3x3 S:2 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S2L2,class,https://w3id.org/dpv/risk#RM3x3S2L2,Moderate Risk (RM3x3 S:2 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S2L3,class,https://w3id.org/dpv/risk#RM3x3S2L3,High Risk (RM3x3 S:2 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S3L1,class,https://w3id.org/dpv/risk#RM3x3S3L1,Moderate Risk (RM3x3 S:3 L:1),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S3L2,class,https://w3id.org/dpv/risk#RM3x3S3L2,High Risk (RM3x3 S:3 L:2),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM3x3S3L3,class,https://w3id.org/dpv/risk#RM3x3S3L3,High Risk (RM3x3 S:3 L:3),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L1,class,https://w3id.org/dpv/risk#RM5x5S1L1,Very Low Risk (RM5x5 S:1 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L2,class,https://w3id.org/dpv/risk#RM5x5S1L2,Very Low Risk (RM5x5 S:1 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L3,class,https://w3id.org/dpv/risk#RM5x5S1L3,Very Low Risk (RM5x5 S:1 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L4,class,https://w3id.org/dpv/risk#RM5x5S1L4,Low Risk (RM5x5 S:1 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S1L5,class,https://w3id.org/dpv/risk#RM5x5S1L5,Low Risk (RM5x5 S:1 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L1,class,https://w3id.org/dpv/risk#RM5x5S2L1,Very Low Risk (RM5x5 S:2 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L2,class,https://w3id.org/dpv/risk#RM5x5S2L2,Low Risk (RM5x5 S:2 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L3,class,https://w3id.org/dpv/risk#RM5x5S2L3,Moderate Risk (RM5x5 S:2 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L4,class,https://w3id.org/dpv/risk#RM5x5S2L4,Moderate Risk (RM5x5 S:2 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S2L5,class,https://w3id.org/dpv/risk#RM5x5S2L5,High Risk (RM5x5 S:2 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L1,class,https://w3id.org/dpv/risk#RM5x5S3L1,Very Low Risk (RM5x5 S:3 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L2,class,https://w3id.org/dpv/risk#RM5x5S3L2,Moderate Risk (RM5x5 S:3 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L3,class,https://w3id.org/dpv/risk#RM5x5S3L3,Moderate Risk (RM5x5 S:3 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L4,class,https://w3id.org/dpv/risk#RM5x5S3L4,High Risk (RM5x5 S:3 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S3L5,class,https://w3id.org/dpv/risk#RM5x5S3L5,Very High Risk (RM5x5 S:3 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L1,class,https://w3id.org/dpv/risk#RM5x5S4L1,Low Risk (RM5x5 S:4 L:1),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L2,class,https://w3id.org/dpv/risk#RM5x5S4L2,Moderate Risk (RM5x5 S:4 L:2),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L3,class,https://w3id.org/dpv/risk#RM5x5S4L3,High Risk (RM5x5 S:4 L:3),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L4,class,https://w3id.org/dpv/risk#RM5x5S4L4,Very High Risk (RM5x5 S:4 L:4),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S4L5,class,https://w3id.org/dpv/risk#RM5x5S4L5,Very High Risk (RM5x5 S:4 L:5),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L1,class,https://w3id.org/dpv/risk#RM5x5S5L1,Low Risk (RM5x5 S:5 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L2,class,https://w3id.org/dpv/risk#RM5x5S5L2,High Risk (RM5x5 S:5 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L3,class,https://w3id.org/dpv/risk#RM5x5S5L3,High Risk (RM5x5 S:5 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L4,class,https://w3id.org/dpv/risk#RM5x5S5L4,Very High Risk (RM5x5 S:5 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM5x5S5L5,class,https://w3id.org/dpv/risk#RM5x5S5L5,Very High Risk (RM5x5 S:5 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L1,class,https://w3id.org/dpv/risk#RM7x7S1L1,Extremely Low Risk (RM7x7 S:1 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L2,class,https://w3id.org/dpv/risk#RM7x7S1L2,Extremely Low Risk (RM7x7 S:1 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L3,class,https://w3id.org/dpv/risk#RM7x7S1L3,Extremely Low Risk (RM7x7 S:1 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L4,class,https://w3id.org/dpv/risk#RM7x7S1L4,Very Low Risk (RM7x7 S:1 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L5,class,https://w3id.org/dpv/risk#RM7x7S1L5,Very Low Risk (RM7x7 S:1 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L6,class,https://w3id.org/dpv/risk#RM7x7S1L6,Very Low Risk (RM7x7 S:1 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S1L7,class,https://w3id.org/dpv/risk#RM7x7S1L7,Low Risk (RM7x7 S:1 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L1,class,https://w3id.org/dpv/risk#RM7x7S2L1,Extremely Low Risk (RM7x7 S:2 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L2,class,https://w3id.org/dpv/risk#RM7x7S2L2,Extremely Low Risk (RM7x7 S:2 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L3,class,https://w3id.org/dpv/risk#RM7x7S2L3,Very Low Risk (RM7x7 S:2 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L4,class,https://w3id.org/dpv/risk#RM7x7S2L4,Low Risk (RM7x7 S:2 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L5,class,https://w3id.org/dpv/risk#RM7x7S2L5,Low Risk (RM7x7 S:2 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L6,class,https://w3id.org/dpv/risk#RM7x7S2L6,Moderate Risk (RM7x7 S:2 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S2L7,class,https://w3id.org/dpv/risk#RM7x7S2L7,Moderate Risk (RM7x7 S:2 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L1,class,https://w3id.org/dpv/risk#RM7x7S3L1,Extremely Low Risk (RM7x7 S:3 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L2,class,https://w3id.org/dpv/risk#RM7x7S3L2,Very Low Risk (RM7x7 S:3 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L3,class,https://w3id.org/dpv/risk#RM7x7S3L3,Low Risk (RM7x7 S:3 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L4,class,https://w3id.org/dpv/risk#RM7x7S3L4,Moderate Risk (RM7x7 S:3 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L5,class,https://w3id.org/dpv/risk#RM7x7S3L5,High Risk (RM7x7 S:3 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L6,class,https://w3id.org/dpv/risk#RM7x7S3L6,High Risk (RM7x7 S:3 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S3L7,class,https://w3id.org/dpv/risk#RM7x7S3L7,Very High Risk (RM7x7 S:3 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L1,class,https://w3id.org/dpv/risk#RM7x7S4L1,Extremely Low Risk (RM7x7 S:4 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L2,class,https://w3id.org/dpv/risk#RM7x7S4L2,Low Risk (RM7x7 S:4 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L3,class,https://w3id.org/dpv/risk#RM7x7S4L3,Moderate Risk (RM7x7 S:4 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L4,class,https://w3id.org/dpv/risk#RM7x7S4L4,High Risk (RM7x7 S:4 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L5,class,https://w3id.org/dpv/risk#RM7x7S4L5,High Risk (RM7x7 S:4 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L6,class,https://w3id.org/dpv/risk#RM7x7S4L6,Very High Risk (RM7x7 S:4 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S4L7,class,https://w3id.org/dpv/risk#RM7x7S4L7,Very High Risk (RM7x7 S:4 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L1,class,https://w3id.org/dpv/risk#RM7x7S5L1,Very Low Risk (RM7x7 S:5 L:1),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L2,class,https://w3id.org/dpv/risk#RM7x7S5L2,Low Risk (RM7x7 S:5 L:2),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L3,class,https://w3id.org/dpv/risk#RM7x7S5L3,Moderate Risk (RM7x7 S:5 L:3),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L4,class,https://w3id.org/dpv/risk#RM7x7S5L4,High Risk (RM7x7 S:5 L:4),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L5,class,https://w3id.org/dpv/risk#RM7x7S5L5,Very High Risk (RM7x7 S:5 L:5),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L6,class,https://w3id.org/dpv/risk#RM7x7S5L6,Extremely High Risk (RM7x7 S:5 L:6),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S5L7,class,https://w3id.org/dpv/risk#RM7x7S5L7,Extremely High Risk (RM7x7 S:5 L:7),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L1,class,https://w3id.org/dpv/risk#RM7x7S6L1,Very Low Risk (RM7x7 S:6 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L2,class,https://w3id.org/dpv/risk#RM7x7S6L2,Moderate Risk (RM7x7 S:6 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L3,class,https://w3id.org/dpv/risk#RM7x7S6L3,High Risk (RM7x7 S:6 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L4,class,https://w3id.org/dpv/risk#RM7x7S6L4,Very High Risk (RM7x7 S:6 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L5,class,https://w3id.org/dpv/risk#RM7x7S6L5,Very High Risk (RM7x7 S:6 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L6,class,https://w3id.org/dpv/risk#RM7x7S6L6,Extremely High Risk (RM7x7 S:6 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S6L7,class,https://w3id.org/dpv/risk#RM7x7S6L7,Extremely High Risk (RM7x7 S:6 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L1,class,https://w3id.org/dpv/risk#RM7x7S7L1,Low Risk (RM7x7 S:7 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L2,class,https://w3id.org/dpv/risk#RM7x7S7L2,Moderate Risk (RM7x7 S:7 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L3,class,https://w3id.org/dpv/risk#RM7x7S7L3,High Risk (RM7x7 S:7 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L4,class,https://w3id.org/dpv/risk#RM7x7S7L4,Very High Risk (RM7x7 S:7 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L5,class,https://w3id.org/dpv/risk#RM7x7S7L5,Extremely High Risk (RM7x7 S:7 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L6,class,https://w3id.org/dpv/risk#RM7x7S7L6,Extremely High Risk (RM7x7 S:7 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RM7x7S7L7,class,https://w3id.org/dpv/risk#RM7x7S7L7,Extremely High Risk (RM7x7 S:7 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RansomwareAttack,class,https://w3id.org/dpv/risk#RansomwareAttack,Ransomware Attack,Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control,Control to recover from event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Re-identification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-19,,risk,https://w3id.org/dpv/risk -RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemoteSpying,class,https://w3id.org/dpv/risk#RemoteSpying,Remote Spying,Remote Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Renumeration provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -ReplacementCosts,class,https://w3id.org/dpv/risk#ReplacementCosts,Replacement Costs,Replacement Costs,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -ReputationTrustImpact,class,https://w3id.org/dpv/risk#ReputationTrustImpact,Reputation and trust impact,Reputation and trust impact,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -RetrievalDeletedData,class,https://w3id.org/dpv/risk#RetrievalDeletedData,Retrieval of Deleted Data,Retrieval of Deleted Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -RetrievalDiscardedEquipment,class,https://w3id.org/dpv/risk#RetrievalDiscardedEquipment,Retrieval of Discarded Equipment,Retrieval of Discarded Equipment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Reward provided as compensation (as an impact),https://w3id.org/dpv#Impact,,https://w3id.org/dpv/risk#Compensation,,2024-04-14,,risk,https://w3id.org/dpv/risk -RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk -RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk -RiskControl,class,https://w3id.org/dpv/risk#RiskControl,Risk Control,Control that modifies risk,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk -RiskManagement,class,https://w3id.org/dpv/risk#RiskManagement,Risk Management,"Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk",,,,,2024-06-12,,risk,https://w3id.org/dpv/risk -RiskMatrix,class,https://w3id.org/dpv/risk#RiskMatrix,Risk Matrix,Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.,https://w3id.org/dpv/risk#RiskAssessment,,https://w3id.org/dpv/risk#RiskAssessment,,2024-02-14,,risk,https://w3id.org/dpv/risk -RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk -RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk -RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk -RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Sabotage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Scam,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Security Breach,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-17,,risk,https://w3id.org/dpv/risk -ServiceInterruption,class,https://w3id.org/dpv/risk#ServiceInterruption,Service Interruption,Service Interruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Sexual Violence,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Social Disadvantage,https://w3id.org/dpv#Risk,,https://w3id.org/dpv#Risk,,2022-08-19,,risk,https://w3id.org/dpv/risk -SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Spam,class,https://w3id.org/dpv/risk#Spam,Spam,Spam,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Spoofing,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Spying,class,https://w3id.org/dpv/risk#Spying,Spying,Spying,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Stalking,class,https://w3id.org/dpv/risk#Stalking,Stalking,Stalking,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,System Failure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,System Intrusion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,System Malfunction,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Terrorism,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-17,,risk,https://w3id.org/dpv/risk -Theft,class,https://w3id.org/dpv/risk#Theft,Theft,Theft,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -TheftEquipment,class,https://w3id.org/dpv/risk#TheftEquipment,Theft of Equipment,Theft of Equipment,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -TheftMedia,class,https://w3id.org/dpv/risk#TheftMedia,Theft of Media,Theft of Media,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#MaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ThirdPartyOperationDisruption,class,https://w3id.org/dpv/risk#ThirdPartyOperationDisruption,Third Party Operation Disruption,Third Party Operation Disruption,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk -ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Unauthorised Access to Premises,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Unauthorised Code Access,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Unauthorised Code Disclosure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Unauthorised Code Modification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Unauthorised Data Access,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Unauthorised Data Disclosure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Unauthorised Data Modification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedImpersonation,class,https://w3id.org/dpv/risk#UnauthorisedImpersonation,Unauthorised Impersonation,Unauthorised Impersonation,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#NonMaterialDamage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Unauthorised Information Disclosure,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Unauthorised Re-Identification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Reidentification,,2022-08-19,,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Unauthorised Resource Use,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Unauthorised System Access,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Unauthorised System Modification,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnknownVulnerabilityExploited,class,https://w3id.org/dpv/risk#UnknownVulnerabilityExploited,Unknown Vulnerability Exploited,Unknown Vulnerability Exploited,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Unwanted Code Deletion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Unwanted Data Deletion,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Unwanted Disclosure of Data,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -Vandalism,class,https://w3id.org/dpv/risk#Vandalism,Vandalism,Vandalism,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ViolationCodeConduct,class,https://w3id.org/dpv/risk#ViolationCodeConduct,Violation of Code of Conduct,Violation of Code of Conduct,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationContractualObligations,class,https://w3id.org/dpv/risk#ViolationContractualObligations,Violation of Contractual Obligations,Violation of Contractual Obligations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationEthicalCode,class,https://w3id.org/dpv/risk#ViolationEthicalCode,Violation of Ethical Code,Violation of Ethical Code,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationOfRights,class,https://w3id.org/dpv/risk#ViolationOfRights,Violation of Rights,Violation of Rights,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Harm,,2022-08-18,,risk,https://w3id.org/dpv/risk -ViolationRegulatoryObligations,class,https://w3id.org/dpv/risk#ViolationRegulatoryObligations,Violation of Regulatory Obligations,Violation of Regulatory Obligations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -ViolationStatutoryObligations,class,https://w3id.org/dpv/risk#ViolationStatutoryObligations,Violation of Statutory Obligations,Violation of Statutory Obligations,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Damage,,2022-08-17,,risk,https://w3id.org/dpv/risk -Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Vulnerability Created,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -VulnerabilityExploited,class,https://w3id.org/dpv/risk#VulnerabilityExploited,Vulnerability Exploited,Vulnerability Exploited,https://w3id.org/dpv#Risk,,https://w3id.org/dpv/risk#Detriment,,2022-08-17,,risk,https://w3id.org/dpv/risk -causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -exploitsVulnerability,property,https://w3id.org/dpv/risk#exploitsVulnerability,exploits vulnerability,Indicates the threat (subject) exploits the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasControl,property,https://w3id.org/dpv/risk#hasControl,has control,Indicates the use of specified control,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasIncident,property,https://w3id.org/dpv/risk#hasIncident,has incident,Indicates an incident is associated with the specified context,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasRiskSource,property,https://w3id.org/dpv/risk#hasRiskSource,has risk source,Indicates the risk (subject) has the indicated risk source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasThreatSource,property,https://w3id.org/dpv/risk#hasThreatSource,has threat source,Indicates the threat (subject) has the indicated source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -hasVulnerability,property,https://w3id.org/dpv/risk#hasVulnerability,has vulnerability,Indicates the associated context (subject) has indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -isExploitedBy,property,https://w3id.org/dpv/risk#isExploitedBy,is exploited by,Indicates the vulnerability (subject) is exploited by the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -isVulnerabilityOf,property,https://w3id.org/dpv/risk#isVulnerabilityOf,is vulnerability of,Indicates the vulnerability (subject) is associated with indicated context (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -refersToRisk,property,https://w3id.org/dpv/risk#refersToRisk,refers to risk,Indicates the incident (subject) is a materialisation of the indicated risk (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +3LikelihoodLevels,class,https://w3id.org/dpv/risk#3LikelihoodLevels,3 Likelihood Levels,Scale with 3 Likelihood Levels from High to Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk +3RiskLevels,class,https://w3id.org/dpv/risk#3RiskLevels,3 Risk Levels,Scale with 3 Risk Levels from High to Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk +3SeverityLevels,class,https://w3id.org/dpv/risk#3SeverityLevels,3 Severity Levels,Scale with 3 Severity Levels from High to Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk +5LikelihoodLevels,class,https://w3id.org/dpv/risk#5LikelihoodLevels,5 Likelihood Levels,Scale with 5 Likelihood Levels from Very High to Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk +5RiskLevels,class,https://w3id.org/dpv/risk#5RiskLevels,5 Risk Levels,Scale with 5 Risk Levels from Very High to Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk +5SeverityLevels,class,https://w3id.org/dpv/risk#5SeverityLevels,5 Severity Levels,Scale with 5 Severity Levels from Very High to Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk +7LikelihoodLevels,class,https://w3id.org/dpv/risk#7LikelihoodLevels,7 Likelihood Levels,Scale with 7 Likelihood Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv#Likelihood,,2022-08-18,,risk,https://w3id.org/dpv/risk +7RiskLevels,class,https://w3id.org/dpv/risk#7RiskLevels,7 Risk Levels,Scale with 7 Risk Levels from Extremely High to Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk +7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk +AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyLowLikelihood,class,https://w3id.org/dpv/risk#ExtremelyLowLikelihood,Extremely Low Likelihood,Level where Likelihood is Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyLowRisk,class,https://w3id.org/dpv/risk#ExtremelyLowRisk,Extremely Low Risk,Level where Risk is Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extremely Low Severity,Level where Severity is Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk +HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk +IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentConcludingReport,class,https://w3id.org/dpv/risk#IncidentConcludingReport,Incident Concluding Report,A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentDetectionReport,class,https://w3id.org/dpv/risk#IncidentDetectionReport,Incident Detection Report,A report describing the detection of a Incident,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentHalted,class,https://w3id.org/dpv/risk#IncidentHalted,Incident Halted,The incident has halted or paused with a high likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentHandlingReport,class,https://w3id.org/dpv/risk#IncidentHandlingReport,Incident Handling Report,A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentIdentifier,class,https://w3id.org/dpv/risk#IncidentIdentifier,Incident Identifier,Identifier associated with an incident,,,,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentImpactAssessment,class,https://w3id.org/dpv/risk#IncidentImpactAssessment,Incident Impact Assessment,An impact assessment associated with a incident,,https://w3id.org/dpv#ImpactAssessment,https://w3id.org/dpv#ImpactAssessment,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentMitigated,class,https://w3id.org/dpv/risk#IncidentMitigated,Incident Mitigated,The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentMitigationMeasure,class,https://w3id.org/dpv/risk#IncidentMitigationMeasure,Incident Mitigation Measure,A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentNearMiss,class,https://w3id.org/dpv/risk#IncidentNearMiss,Incident Near Miss,"The state where an incident was almost successful in taking place i.e. ""it came very close""",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentNotice,class,https://w3id.org/dpv/risk#IncidentNotice,Incident Notice,Notice associated with an Incident,,https://w3id.org/dpv#Notice,https://w3id.org/dpv#Notice,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentOngoing,class,https://w3id.org/dpv/risk#IncidentOngoing,Incident Ongoing,The incident is ongoing i.e. still active,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentOngoingReport,class,https://w3id.org/dpv/risk#IncidentOngoingReport,Incident Ongoing Report,A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentPreliminaryReport,class,https://w3id.org/dpv/risk#IncidentPreliminaryReport,Incident Preliminary Report,A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentRegister,class,https://w3id.org/dpv/risk#IncidentRegister,Incident Register,"A register recording incidentes, their reports, notifications, and other related activities",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentReport,class,https://w3id.org/dpv/risk#IncidentReport,Incident Report,"Documented information about an incident, its handling, assessments,and notifications",,https://w3id.org/dpv#RecordsOfActivities,https://w3id.org/dpv#RecordsOfActivities,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentStatus,class,https://w3id.org/dpv/risk#IncidentStatus,Incident Status,Status associated with an incident,,https://w3id.org/dpv#Status,https://w3id.org/dpv#Status,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentStatusUnknown,class,https://w3id.org/dpv/risk#IncidentStatusUnknown,Incident Status Unknown,The status of a incident is unknown,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentSuspected,class,https://w3id.org/dpv/risk#IncidentSuspected,Incident Suspected,"The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport,Incident Suspected Report,A report describing the suspicion of an incident in the past or occuring,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk +IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk +IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk +Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk +JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk +LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk +ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorRisk,class,https://w3id.org/dpv/risk#MonitorRisk,Monitor Risk,Control that monitors a Risk,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Control,Control that monitors another Control,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RM3x3S1L1,class,https://w3id.org/dpv/risk#RM3x3S1L1,Low Risk (RM3x3 S:1 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S1L2,class,https://w3id.org/dpv/risk#RM3x3S1L2,Low Risk (RM3x3 S:1 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S1L3,class,https://w3id.org/dpv/risk#RM3x3S1L3,Moderate Risk (RM3x3 S:1 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S2L1,class,https://w3id.org/dpv/risk#RM3x3S2L1,Low Risk (RM3x3 S:2 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S2L2,class,https://w3id.org/dpv/risk#RM3x3S2L2,Moderate Risk (RM3x3 S:2 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S2L3,class,https://w3id.org/dpv/risk#RM3x3S2L3,High Risk (RM3x3 S:2 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S3L1,class,https://w3id.org/dpv/risk#RM3x3S3L1,Moderate Risk (RM3x3 S:3 L:1),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S3L2,class,https://w3id.org/dpv/risk#RM3x3S3L2,High Risk (RM3x3 S:3 L:2),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM3x3S3L3,class,https://w3id.org/dpv/risk#RM3x3S3L3,High Risk (RM3x3 S:3 L:3),Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L1,class,https://w3id.org/dpv/risk#RM5x5S1L1,Very Low Risk (RM5x5 S:1 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L2,class,https://w3id.org/dpv/risk#RM5x5S1L2,Very Low Risk (RM5x5 S:1 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L3,class,https://w3id.org/dpv/risk#RM5x5S1L3,Very Low Risk (RM5x5 S:1 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L4,class,https://w3id.org/dpv/risk#RM5x5S1L4,Low Risk (RM5x5 S:1 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S1L5,class,https://w3id.org/dpv/risk#RM5x5S1L5,Low Risk (RM5x5 S:1 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L1,class,https://w3id.org/dpv/risk#RM5x5S2L1,Very Low Risk (RM5x5 S:2 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L2,class,https://w3id.org/dpv/risk#RM5x5S2L2,Low Risk (RM5x5 S:2 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L3,class,https://w3id.org/dpv/risk#RM5x5S2L3,Moderate Risk (RM5x5 S:2 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L4,class,https://w3id.org/dpv/risk#RM5x5S2L4,Moderate Risk (RM5x5 S:2 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S2L5,class,https://w3id.org/dpv/risk#RM5x5S2L5,High Risk (RM5x5 S:2 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L1,class,https://w3id.org/dpv/risk#RM5x5S3L1,Very Low Risk (RM5x5 S:3 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L2,class,https://w3id.org/dpv/risk#RM5x5S3L2,Moderate Risk (RM5x5 S:3 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L3,class,https://w3id.org/dpv/risk#RM5x5S3L3,Moderate Risk (RM5x5 S:3 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L4,class,https://w3id.org/dpv/risk#RM5x5S3L4,High Risk (RM5x5 S:3 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S3L5,class,https://w3id.org/dpv/risk#RM5x5S3L5,Very High Risk (RM5x5 S:3 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L1,class,https://w3id.org/dpv/risk#RM5x5S4L1,Low Risk (RM5x5 S:4 L:1),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L2,class,https://w3id.org/dpv/risk#RM5x5S4L2,Moderate Risk (RM5x5 S:4 L:2),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L3,class,https://w3id.org/dpv/risk#RM5x5S4L3,High Risk (RM5x5 S:4 L:3),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L4,class,https://w3id.org/dpv/risk#RM5x5S4L4,Very High Risk (RM5x5 S:4 L:4),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S4L5,class,https://w3id.org/dpv/risk#RM5x5S4L5,Very High Risk (RM5x5 S:4 L:5),Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L1,class,https://w3id.org/dpv/risk#RM5x5S5L1,Low Risk (RM5x5 S:5 L:1),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L2,class,https://w3id.org/dpv/risk#RM5x5S5L2,High Risk (RM5x5 S:5 L:2),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L3,class,https://w3id.org/dpv/risk#RM5x5S5L3,High Risk (RM5x5 S:5 L:3),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L4,class,https://w3id.org/dpv/risk#RM5x5S5L4,Very High Risk (RM5x5 S:5 L:4),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM5x5S5L5,class,https://w3id.org/dpv/risk#RM5x5S5L5,Very High Risk (RM5x5 S:5 L:5),Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix5x5,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L1,class,https://w3id.org/dpv/risk#RM7x7S1L1,Extremely Low Risk (RM7x7 S:1 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L2,class,https://w3id.org/dpv/risk#RM7x7S1L2,Extremely Low Risk (RM7x7 S:1 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L3,class,https://w3id.org/dpv/risk#RM7x7S1L3,Extremely Low Risk (RM7x7 S:1 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L4,class,https://w3id.org/dpv/risk#RM7x7S1L4,Very Low Risk (RM7x7 S:1 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L5,class,https://w3id.org/dpv/risk#RM7x7S1L5,Very Low Risk (RM7x7 S:1 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L6,class,https://w3id.org/dpv/risk#RM7x7S1L6,Very Low Risk (RM7x7 S:1 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S1L7,class,https://w3id.org/dpv/risk#RM7x7S1L7,Low Risk (RM7x7 S:1 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L1,class,https://w3id.org/dpv/risk#RM7x7S2L1,Extremely Low Risk (RM7x7 S:2 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L2,class,https://w3id.org/dpv/risk#RM7x7S2L2,Extremely Low Risk (RM7x7 S:2 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L3,class,https://w3id.org/dpv/risk#RM7x7S2L3,Very Low Risk (RM7x7 S:2 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L4,class,https://w3id.org/dpv/risk#RM7x7S2L4,Low Risk (RM7x7 S:2 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L5,class,https://w3id.org/dpv/risk#RM7x7S2L5,Low Risk (RM7x7 S:2 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L6,class,https://w3id.org/dpv/risk#RM7x7S2L6,Moderate Risk (RM7x7 S:2 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S2L7,class,https://w3id.org/dpv/risk#RM7x7S2L7,Moderate Risk (RM7x7 S:2 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L1,class,https://w3id.org/dpv/risk#RM7x7S3L1,Extremely Low Risk (RM7x7 S:3 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L2,class,https://w3id.org/dpv/risk#RM7x7S3L2,Very Low Risk (RM7x7 S:3 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L3,class,https://w3id.org/dpv/risk#RM7x7S3L3,Low Risk (RM7x7 S:3 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L4,class,https://w3id.org/dpv/risk#RM7x7S3L4,Moderate Risk (RM7x7 S:3 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L5,class,https://w3id.org/dpv/risk#RM7x7S3L5,High Risk (RM7x7 S:3 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L6,class,https://w3id.org/dpv/risk#RM7x7S3L6,High Risk (RM7x7 S:3 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S3L7,class,https://w3id.org/dpv/risk#RM7x7S3L7,Very High Risk (RM7x7 S:3 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L1,class,https://w3id.org/dpv/risk#RM7x7S4L1,Extremely Low Risk (RM7x7 S:4 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L2,class,https://w3id.org/dpv/risk#RM7x7S4L2,Low Risk (RM7x7 S:4 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L3,class,https://w3id.org/dpv/risk#RM7x7S4L3,Moderate Risk (RM7x7 S:4 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L4,class,https://w3id.org/dpv/risk#RM7x7S4L4,High Risk (RM7x7 S:4 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L5,class,https://w3id.org/dpv/risk#RM7x7S4L5,High Risk (RM7x7 S:4 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L6,class,https://w3id.org/dpv/risk#RM7x7S4L6,Very High Risk (RM7x7 S:4 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S4L7,class,https://w3id.org/dpv/risk#RM7x7S4L7,Very High Risk (RM7x7 S:4 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L1,class,https://w3id.org/dpv/risk#RM7x7S5L1,Very Low Risk (RM7x7 S:5 L:1),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L2,class,https://w3id.org/dpv/risk#RM7x7S5L2,Low Risk (RM7x7 S:5 L:2),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L3,class,https://w3id.org/dpv/risk#RM7x7S5L3,Moderate Risk (RM7x7 S:5 L:3),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L4,class,https://w3id.org/dpv/risk#RM7x7S5L4,High Risk (RM7x7 S:5 L:4),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L5,class,https://w3id.org/dpv/risk#RM7x7S5L5,Very High Risk (RM7x7 S:5 L:5),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L6,class,https://w3id.org/dpv/risk#RM7x7S5L6,Extremely High Risk (RM7x7 S:5 L:6),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S5L7,class,https://w3id.org/dpv/risk#RM7x7S5L7,Extremely High Risk (RM7x7 S:5 L:7),Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L1,class,https://w3id.org/dpv/risk#RM7x7S6L1,Very Low Risk (RM7x7 S:6 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L2,class,https://w3id.org/dpv/risk#RM7x7S6L2,Moderate Risk (RM7x7 S:6 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L3,class,https://w3id.org/dpv/risk#RM7x7S6L3,High Risk (RM7x7 S:6 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L4,class,https://w3id.org/dpv/risk#RM7x7S6L4,Very High Risk (RM7x7 S:6 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L5,class,https://w3id.org/dpv/risk#RM7x7S6L5,Very High Risk (RM7x7 S:6 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L6,class,https://w3id.org/dpv/risk#RM7x7S6L6,Extremely High Risk (RM7x7 S:6 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S6L7,class,https://w3id.org/dpv/risk#RM7x7S6L7,Extremely High Risk (RM7x7 S:6 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L1,class,https://w3id.org/dpv/risk#RM7x7S7L1,Low Risk (RM7x7 S:7 L:1),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L2,class,https://w3id.org/dpv/risk#RM7x7S7L2,Moderate Risk (RM7x7 S:7 L:2),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L3,class,https://w3id.org/dpv/risk#RM7x7S7L3,High Risk (RM7x7 S:7 L:3),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L4,class,https://w3id.org/dpv/risk#RM7x7S7L4,Very High Risk (RM7x7 S:7 L:4),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L5,class,https://w3id.org/dpv/risk#RM7x7S7L5,Extremely High Risk (RM7x7 S:7 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L6,class,https://w3id.org/dpv/risk#RM7x7S7L6,Extremely High Risk (RM7x7 S:7 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RM7x7S7L7,class,https://w3id.org/dpv/risk#RM7x7S7L7,Extremely High Risk (RM7x7 S:7 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control,Control to recover from event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk +RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk +RiskControl,class,https://w3id.org/dpv/risk#RiskControl,Risk Control,Control that modifies risk,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk +RiskManagement,class,https://w3id.org/dpv/risk#RiskManagement,Risk Management,"Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk",,,,,2024-06-12,,risk,https://w3id.org/dpv/risk +RiskMatrix,class,https://w3id.org/dpv/risk#RiskMatrix,Risk Matrix,Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.,https://w3id.org/dpv/risk#RiskAssessment,,https://w3id.org/dpv/risk#RiskAssessment,,2024-02-14,,risk,https://w3id.org/dpv/risk +RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk +RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk +RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk +RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk +SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk +ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk +ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +exploitsVulnerability,property,https://w3id.org/dpv/risk#exploitsVulnerability,exploits vulnerability,Indicates the threat (subject) exploits the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasControl,property,https://w3id.org/dpv/risk#hasControl,has control,Indicates the use of specified control,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasIncident,property,https://w3id.org/dpv/risk#hasIncident,has incident,Indicates an incident is associated with the specified context,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasRiskSource,property,https://w3id.org/dpv/risk#hasRiskSource,has risk source,Indicates the risk (subject) has the indicated risk source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasThreatSource,property,https://w3id.org/dpv/risk#hasThreatSource,has threat source,Indicates the threat (subject) has the indicated source (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +hasVulnerability,property,https://w3id.org/dpv/risk#hasVulnerability,has vulnerability,Indicates the associated context (subject) has indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +isExploitedBy,property,https://w3id.org/dpv/risk#isExploitedBy,is exploited by,Indicates the vulnerability (subject) is exploited by the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +isVulnerabilityOf,property,https://w3id.org/dpv/risk#isVulnerabilityOf,is vulnerability of,Indicates the vulnerability (subject) is associated with indicated context (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk +refersToRisk,property,https://w3id.org/dpv/risk#refersToRisk,refers to risk,Indicates the incident (subject) is a materialisation of the indicated risk (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/risk.html b/2.1-dev/risk/risk.html index d148174cd..c8b42bf5f 100644 --- a/2.1-dev/risk/risk.html +++ b/2.1-dev/risk/risk.html @@ -1024,7 +1024,7 @@

    Incident

    -

    Incident Status

    +

    Incident Status

    • risk:IncidentStatus: Status associated with an incident @@ -1074,6 +1074,10 @@

      Incident Status

    + +
    +

    Incident Report

    +
    @@ -1247,5858 +1251,923 @@

    Consequences and Impacts

    -

    The RISK extension provides a taxonomy to expand upon the [[DPV]] concepts of dpv:Consequence and dpv:Impact. In [[DPV]], consequence is in general an outcome of an event, while impacts are a specific subset of consequences which affect entities (as compared to systems and technologies). The intent of this distinction is to support regulatory requirements such as impact assessments which are focused on how processes affect entities such as individuals and societal groups.

    -

    Broadly, the taxonomy is based on the following commonly required concepts:

    -
      -
    1. Consequences: -
        -
      1. [=Benefit=]
      2. -
      3. [=Detriment=]
      4. -
      5. [=Damage=]
      6. -
    2. -
    3. Impacts: -
        -
      1. [=MaterialDamage=]
      2. -
      3. [=NonMaterialDamage=]
      4. -
      5. [=Harm=]
      6. -
      7. [=Compensation=]
      8. -
      9. [=Reward=]
      10. -
      11. [=Payment=]
      12. -
      13. [=Fee=]
      14. -
      15. [=Renumeration=]
      16. -
    4. -
    -
      -
    • - risk:Benefit: Impact(s) that acts as or causes benefits - go to full definition -
        -
      • - risk:Compensation: Compensation provided (as an impact) - go to full definition -
          -
        • - risk:Fee: Fee provided as compensation (as an impact) - go to full definition - -
        • +

          The RISK extension provides a single unified taxonomy of concepts that can take on the roles of `RiskSource`, `Risk`, `Consequence`, and `Impact` in an use-case. For example, the same concept `DataBreach` can be the the `Risk` in a risk assessment whose impacts are to be determined, or it can be the `Impact` whose causes must be discovered. By providing a single taxonomy, the adopter is free to choose which role the concept plays within their use-case - which offers significant benefits in terms of both extensibility and flexibility, allowing users to tailor the taxonomy to their specific use cases while maintaining a consistent framework.

          +

          The RISK taxonomy's design allows it to be highly and easily extensible as concepts are not required to be strictly categorised as risks or impacts within the DPV specifications itself. This is particularly valuable as the areas of cybersecurity and AI technologies are rapidly evolving landscapes where new risks and risk sources frequently emerge.

          +

          To enable the creation of this taxonomy, the concept `dpv:RiskConcept` acts as the parent or top concept, and `dpv:Risk`, `dpv:Consequence`, `dpv:Impact`, and `risk:RiskSource` are defined as its subclasses. To utilise these concepts in particular roles, the associated relations or properties such as `dpv:hasRisk` and `dpv:hasImpact` are used.

          + + +

          The risk concepts taxonomy is broadly divided into the following categories:

          + + +
          +

          InternalSecurityThreat

          +
          +
          +
          +

          UserRisks

          +
          - -
        -
      • - risk:BusinessImpact: Business impact - go to full definition + risk:HumanErrors: Something that acts as or causes Human Errors + go to full definition
      • - risk:CitizensImpact: Citizens impact - go to full definition + risk:IntentionalMisuse: Intentional Misuse + go to full definition
      • - risk:ComplianceImpact: Compliance impact - go to full definition + risk:Misuse: Something that acts as or causes Misuse + go to full definition
      • +
    +
    +
    +

    ExternalSecurityThreat

    +
    +
    +
    +

    OperationalSecurityRisk

    +
    -
  • - risk:IllegalProcessingData: Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition
  • - risk:InterceptionCommunications: Interception of Communications - go to full definition + risk:DataCorruption: Something that acts as or causes Corruption of Data + go to full definition
  • - risk:MaterialDamage: Impact that acts as or causes material damages - go to full definition - -
  • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
  • - risk:LossCompetitiveAdvantage: Loss of Competitive Advantage - go to full definition + risk:Spoofing: Something that acts as or causes Spoofing + go to full definition
  • - risk:LossControlOverData: Loss of Control over Data - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
  • - risk:LossCustomers: Loss of Customers - go to full definition + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition
  • +
    +
    +
    +

    LegalRisk

    +
    +
    +
    +

    ReputationalRisk

    +
    -
  • - risk:PublicOrderBreach: Public Order Breach - go to full definition + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition
  • - risk:UnauthorisedCodeModification: Unauthorised Code Modification - go to full definition + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition
  • - risk:UnauthorisedSystemModification: Unauthorised System Modification - go to full definition + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition
  • - risk:UnwantedCodeDeletion: Unwanted Code Deletion - go to full definition + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition
  • - risk:UnwantedDataDeletion: Unwanted Data Deletion - go to full definition + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition
  • - risk:Vandalism: Vandalism - go to full definition + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition
  • +
    +
    +
    +

    SocietalRisk

    +
    - -
  • - risk:Detriment: Impact that acts as or causes detriments - go to full definition -
  • +
    +
    +

    IndividualRisk

    +
    +
    +
    +

    EnvironmentalRisk

    +
    +
    +
    +

    FinancialImpact

    +
      +
    • + risk:Benefit: Something that acts as or causes benefits + go to full definition
    • - risk:DetrimentToRecovery: Detriment to Recovery - go to full definition + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition
    • - risk:DistributedDenialServiceAttack: Distributed Denial of Service Attack (DDoS) - go to full definition + risk:Fee: Something that acts as or provides fees e.g. for using a service + go to full definition
    • - risk:EquipmentMalfunction: Equipment Malfunction - go to full definition + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition
    • - risk:ErroneousSystemUse: Erroneous System Use - go to full definition + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
    • - risk:FinancialEquipmentCosts: Financial Equipment Costs - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
    • - risk:FinancialInvestigationCosts: Financial Investigation Costs - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
    • - risk:FinancialPersonnelCosts: Financial Personnel Costs - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition
    • - risk:FinancialRepairCosts: Financial Repair Costs - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
    • -
    • - risk:GovernmentCrisis: Government Crisis - go to full definition +
    +
    +
    + + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    + + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + - -
  • - risk:HumanErrors: Human Errors - go to full definition -
  • -
  • - risk:IdentityDispute: Identity Dispute - go to full definition -
  • -
  • - risk:IncreaseInternalCost: Increase Internal Cost - go to full definition -
  • -
  • - risk:IndustrialCrisis: Industrial Crisis - go to full definition -
  • -
  • - risk:InternalOperationDisruption: Internal Operation Disruption - go to full definition -
  • -
  • - risk:KnownVulnerabilityExploited: Known Vulnerability Exploited - go to full definition -
  • -
  • - risk:LawEnforcementAdverseEffects: Law Enforcement Adverse Effects - go to full definition -
  • -
  • - risk:LossCredibility: Loss of Credibility - go to full definition -
  • -
  • - risk:LossCustomerConfidence: Loss of Customer Confidence - go to full definition -
  • -
  • - risk:LossGoodwill: Loss of Goodwill - go to full definition -
  • -
  • - risk:LossNegotiatingCapacity: Loss of Negotiating Capacity - go to full definition -
  • -
  • - risk:LossOpportunity: Loss of Opportunity - go to full definition -
  • -
  • - risk:LossReputation: Loss of Reputation - go to full definition -
  • -
  • - risk:LossTrust: Loss of Trust - go to full definition -
  • -
  • - risk:MaliciousCodeAttack: Intentional use of software by including or inserting in a system for a harmful purpose - go to full definition -
  • -
  • - risk:MalwareAttack: Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - go to full definition -
  • -
  • - risk:MisinformationDisinformation: Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) - go to full definition - -
  • -
  • - risk:MisuseBreachedInformation: Misuse of Breached Information - go to full definition - -
  • -
  • - risk:OrganisationDisruption: Organisation Disruption - go to full definition - -
  • -
  • - risk:ReplacementCosts: Replacement Costs - go to full definition - -
  • -
  • - risk:RetrievalDeletedData: Retrieval of Deleted Data - go to full definition - -
  • -
  • - risk:RetrievalDiscardedEquipment: Retrieval of Discarded Equipment - go to full definition - -
  • -
  • - risk:ServiceInterruption: Service Interruption - go to full definition - -
  • -
  • - risk:SystemFailure: System Failure - go to full definition - -
  • -
  • - risk:SystemIntrusion: System Intrusion - go to full definition - -
  • -
  • - risk:SystemMalfunction: System Malfunction - go to full definition - -
  • -
  • - risk:ThirdPartyOperationDisruption: Third Party Operation Disruption - go to full definition - -
  • -
  • - risk:UnauthorisedAccesstoPremises: Unauthorised Access to Premises - go to full definition - -
  • -
  • - risk:UnauthorisedCodeAccess: Unauthorised Code Access - go to full definition - -
  • -
  • - risk:UnauthorisedCodeDisclosure: Unauthorised Code Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedDataAccess: Unauthorised Data Access - go to full definition - -
  • -
  • - risk:UnauthorisedDataDisclosure: Unauthorised Data Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedInformationDisclosure: Unauthorised Information Disclosure - go to full definition - -
  • -
  • - risk:UnauthorisedResourceUse: Unauthorised Resource Use - go to full definition - -
  • -
  • - risk:UnauthorisedSystemAccess: Unauthorised System Access - go to full definition - -
  • -
  • - risk:UnknownVulnerabilityExploited: Unknown Vulnerability Exploited - go to full definition - -
  • -
  • - risk:UnwantedDisclosureData: Unwanted Disclosure of Data - go to full definition - -
  • -
  • - risk:VulnerabilityCreated: Vulnerability Created - go to full definition - -
  • -
  • - risk:VulnerabilityExploited: Vulnerability Exploited - go to full definition - -
  • - - -
  • - risk:EconomicDisadvantage: Economic Disadvantage - go to full definition - -
  • -
  • - risk:HealthLifeImpact: Health and life impact - go to full definition - -
  • -
  • - risk:ImpactOnDataSubject: Impact on Data Subject - go to full definition - -
  • -
  • - risk:ImpactToRights: Impact to Rights - go to full definition - -
  • -
  • - risk:Misuse: Misuse - go to full definition - -
  • -
  • - risk:PrivacyImpact: Privacy impact - go to full definition - -
  • -
  • - risk:Reidentification: Re-identification - go to full definition - -
  • -
  • - risk:ReputationTrustImpact: Reputation and trust impact - go to full definition - -
  • -
  • - risk:SecurityBreach: Security Breach - go to full definition - -
  • -
  • - risk:SocialDisadvantage: Social Disadvantage - go to full definition - -
  • - -
    - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    - -
      -
    • - risk:RiskMatrix3x3: A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - go to full definition -
        -
      • - risk:RM3x3S1L1: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L2: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S1L3: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L1: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM3x3S2L2: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S2L3: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L1: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM3x3S3L2: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM3x3S3L3: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix5x5: A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - go to full definition -
        -
      • - risk:RM5x5S1L1: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L2: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L3: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S1L4: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S1L5: Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L1: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S2L2: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S2L3: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L4: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S2L5: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L1: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM5x5S3L2: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L3: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S3L4: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S3L5: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L1: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S4L2: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM5x5S4L3: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S4L4: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S4L5: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L1: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM5x5S5L2: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L3: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - go to full definition -
      • -
      • - risk:RM5x5S5L4: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition -
      • -
      • - risk:RM5x5S5L5: Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - go to full definition -
      • -
      -
    • -
    • - risk:RiskMatrix7x7: A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - go to full definition -
        -
      • - risk:RM7x7S1L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S1L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S1L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L1: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L2: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S2L3: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S2L4: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L5: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S2L6: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S2L7: Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L1: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition -
      • -
      • - risk:RM7x7S3L2: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - go to full definition -
      • -
      • - risk:RM7x7S3L3: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - go to full definition -
      • -
      • - risk:RM7x7S3L4: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - go to full definition -
      • -
      • - risk:RM7x7S3L5: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L6: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S3L7: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L1: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - go to full definition - -
      • -
      • - risk:RM7x7S4L2: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S4L3: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S4L4: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L5: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S4L6: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S4L7: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L1: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S5L2: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S5L3: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S5L4: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S5L5: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S5L6: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S5L7: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L1: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - go to full definition - -
      • -
      • - risk:RM7x7S6L2: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S6L3: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S6L4: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L5: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S6L6: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S6L7: Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L1: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - go to full definition - -
      • -
      • - risk:RM7x7S7L2: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - go to full definition - -
      • -
      • - risk:RM7x7S7L3: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - go to full definition - -
      • -
      • - risk:RM7x7S7L4: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - go to full definition - -
      • -
      • - risk:RM7x7S7L5: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L6: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - go to full definition - -
      • -
      • - risk:RM7x7S7L7: Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - go to full definition - -
      • -
      -
    • -
    - -
    - - -
    -

    Vocabulary Index

    -
    -

    Classes

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    3 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    5 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Likelihood Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Risk Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    7 Severity Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity -
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    - - - -
    -

    Abusive Content Utilisation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAbusiveContentUtilisationPrefixrisk
    LabelAbusive Content Utilisation
    IRIhttps://w3id.org/dpv/risk#AbusiveContentUtilisation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAbusive Content Utilisation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Accidental Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Attack on Private Life

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAttackonPrivateLifePrefixrisk
    LabelAttack on Private Life
    IRIhttps://w3id.org/dpv/risk#AttackonPrivateLife
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAttack on Private Life
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Authorisation Failure

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionAuthorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Availability Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Avoid Source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Benefit

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionImpact(s) that acts as or causes benefits
    Date Created2022-03-23
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Blackmail

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBlackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Brute Force Authorisations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBrute Force Authorisations
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business disruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessdisruptionPrefixrisk
    LabelBusiness disruption
    IRIhttps://w3id.org/dpv/risk#Businessdisruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness disruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessImpactPrefixrisk
    LabelBusiness impact
    IRIhttps://w3id.org/dpv/risk#BusinessImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Business Performance Impairment

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermBusinessPerformanceImpairmentPrefixrisk
    LabelBusiness Performance Impairment
    IRIhttps://w3id.org/dpv/risk#BusinessPerformanceImpairment
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionBusiness Performance Impairment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - - - -
    -

    Change Consequence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Change Impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Child Violence

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermChildViolencePrefixrisk
    LabelChild Violence
    IRIhttps://w3id.org/dpv/risk#ChildViolence
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionChild Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Citizens impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCitizensImpactPrefixrisk
    LabelCitizens impact
    IRIhttps://w3id.org/dpv/risk#CitizensImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCitizens impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Coercion

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCoercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compensation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Impact
    Broader/Parent types risk:Benefit - → dpv:Impact - → dpv:Consequence -
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionCompensation provided (as an impact)
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compliance impact

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermComplianceImpactPrefixrisk
    LabelCompliance impact
    IRIhttps://w3id.org/dpv/risk#ComplianceImpact
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompliance impact
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Credentials

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Credentials
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Compromise Account Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCompromiseAccountSecurityPrefixrisk
    LabelCompromise Account Security
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCompromise Account Security
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Confidentiality Breach

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConfidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Confidentiality Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Consequence Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Consequence for Data Subject

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceForDataSubjectPrefixrisk
    LabelConsequence for Data Subject
    IRIhttps://w3id.org/dpv/risk#ConsequenceForDataSubject
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence for Data Subject
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Consequence on Data Security

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermConsequenceOnDataSecurityPrefixrisk
    LabelConsequence on Data Security
    IRIhttps://w3id.org/dpv/risk#ConsequenceOnDataSecurity
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionConsequence on Data Security
    Date Created2022-10-22
    ContributorsHarshvardhan J. Pandit, Georg P. Krog
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Containment Control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK -
    -
    - - - -
    -

    Copyright Violation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCopyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - - - -
    -

    Corruption of Data

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCorruptionDataPrefixrisk
    LabelCorruption of Data
    IRIhttps://w3id.org/dpv/risk#CorruptionData
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCorruption of Data
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Acquisition

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostAcquisitionPrefixrisk
    LabelCost of Acquisition
    IRIhttps://w3id.org/dpv/risk#CostAcquisition
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Acquisition
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Backup

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostBackupPrefixrisk
    LabelCost of Backup
    IRIhttps://w3id.org/dpv/risk#CostBackup
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Backup
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Configuration

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostConfigurationPrefixrisk
    LabelCost of Configuration
    IRIhttps://w3id.org/dpv/risk#CostConfiguration
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Configuration
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Installation

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostInstallationPrefixrisk
    LabelCost of Installation
    IRIhttps://w3id.org/dpv/risk#CostInstallation
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Installation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Penalties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialPenaltiesPrefixrisk
    LabelCost of Judicial Penalties
    IRIhttps://w3id.org/dpv/risk#CostJudicialPenalties
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Penalties
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Judicial Proceedings

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostJudicialProceedingsPrefixrisk
    LabelCost of Judicial Proceedings
    IRIhttps://w3id.org/dpv/risk#CostJudicialProceedings
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Judicial Proceedings
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Operation Interruption

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostOperationInterruptionPrefixrisk
    LabelCost of Operation Interruption
    IRIhttps://w3id.org/dpv/risk#CostOperationInterruption
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Operation Interruption
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Cost of Suspended Operations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCostSuspendedOperationsPrefixrisk
    LabelCost of Suspended Operations
    IRIhttps://w3id.org/dpv/risk#CostSuspendedOperations
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCost of Suspended Operations
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - -
    -

    Cross-Border Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident -
    Object of relation risk:hasIncident -
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK -
    -
    - - - -
    -

    Cryptojacking

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCryptojackingPrefixrisk
    LabelCryptojacking
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Spying

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCyberSpyingPrefixrisk
    LabelCyber Spying
    IRIhttps://w3id.org/dpv/risk#CyberSpying
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionCyber Spying
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Cyber Stalking

    + + + + + +
    +

    3 Likelihood Levels

    - + - + - + - + - - - - - + - @@ -7109,23 +2178,20 @@

    Cyber Stalking

    - + - - - - + - + @@ -7136,7 +2202,7 @@

    Cyber Stalking

    - @@ -7145,51 +2211,41 @@

    Cyber Stalking

    -
    -

    Damage

    +
    +

    3 Risk Levels

    TermCyberStalking3LikelihoodLevels Prefix risk
    LabelCyber Stalking3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#CyberStalkinghttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionCyber StalkingScale with 3 Likelihood Levels from High to Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7200,7 +2256,7 @@

    Damage

    - + @@ -7213,7 +2269,7 @@

    Damage

    - + @@ -7224,7 +2280,7 @@

    Damage

    - @@ -7233,52 +2289,41 @@

    Damage

    -
    -

    Damage by Third Party

    +
    +

    3 Severity Levels

    TermDamage3RiskLevels Prefix risk
    LabelDamage3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes damagesScale with 3 Risk Levels from High to Low
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7289,23 +2334,20 @@

    Damage by Third Party

    - + - - - - + - + @@ -7316,7 +2358,7 @@

    Damage by Third Party

    - @@ -7325,53 +2367,41 @@

    Damage by Third Party

    -
    -

    Danger to Customers

    +
    +

    5 Likelihood Levels

    TermDamageByThirdParty3SeverityLevels Prefix risk
    LabelDamage by Third Party3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DamageByThirdPartyhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionDamage by Third PartyScale with 3 Severity Levels from High to Low
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7382,23 +2412,20 @@

    Danger to Customers

    - + - - - - + - + @@ -7409,7 +2436,7 @@

    Danger to Customers

    - @@ -7418,53 +2445,41 @@

    Danger to Customers

    -
    -

    Danger to Personnel

    +
    +

    5 Risk Levels

    TermDangertoCustomers5LikelihoodLevels Prefix risk
    LabelDanger to Customers5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DangertoCustomershttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionDanger to CustomersScale with 5 Likelihood Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7475,23 +2490,20 @@

    Danger to Personnel

    - + - - - - + - + @@ -7502,7 +2514,7 @@

    Danger to Personnel

    - @@ -7511,52 +2523,41 @@

    Danger to Personnel

    -
    -

    Data Breach

    +
    +

    5 Severity Levels

    TermDangertoPersonnel5RiskLevels Prefix risk
    LabelDanger to Personnel5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DangertoPersonnelhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDanger to PersonnelScale with 5 Risk Levels from Very High to Very Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7567,26 +2568,20 @@

    Data Breach

    - + - - - - - - - + - + @@ -7597,7 +2592,7 @@

    Data Breach

    - @@ -7605,41 +2600,42 @@

    Data Breach

    -
    -

    Deliberate Incident

    + +
    +

    7 Likelihood Levels

    TermDataBreach5SeverityLevels Prefix risk
    LabelData Breach5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionData BreachScale with 5 Severity Levels from Very High to Very Low
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7650,7 +2646,7 @@

    Deliberate Incident

    - + @@ -7663,15 +2659,18 @@

    Deliberate Incident

    - + - + + + + - @@ -7680,52 +2679,41 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    7 Risk Levels

    TermDeliberateIncident7LikelihoodLevels Prefix risk
    LabelDeliberate Incident7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident + dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to deliberate actions of a humanScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7736,23 +2724,20 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + @@ -7763,7 +2748,7 @@

    Denial of Service Attack (DoS)

    - @@ -7772,45 +2757,41 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    +
    +

    7 Severity Levels

    TermDenialServiceAttack7RiskLevels Prefix risk
    LabelDenial of Service Attack (DoS)7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionDenial of Service Attack (DoS)Scale with 7 Risk Levels from Extremely High to Extremely Low
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -7821,7 +2802,7 @@

    Detection Control

    - + @@ -7834,15 +2815,18 @@

    Detection Control

    - + - + + + + - @@ -7850,52 +2834,42 @@

    Detection Control

    - -
    -

    Detriment

    +
    +

    Accidental Incident

    TermDetectionControl7SeverityLevels Prefix risk
    LabelDetection Control7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to detect eventScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -7906,7 +2880,7 @@

    Detriment

    - + @@ -7919,18 +2893,15 @@

    Detriment

    - + - - - - + - @@ -7939,54 +2910,40 @@

    Detriment

    -
    -

    Detriment to Recovery

    +
    +

    Accidental Misuse

    TermDetrimentAccidentalIncident Prefix risk
    LabelDetrimentAccidental Incident
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes detrimentsIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2022-03-232024-05-19
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -7995,29 +2952,20 @@

    Detriment to Recovery

    - + - - - - + - - - - + - - - - + @@ -8031,55 +2979,40 @@

    Detriment to Recovery

    -
    -

    Discrimination

    +
    +

    Authorisation Failure

    TermDetrimentToRecoveryAccidentalMisuse Prefix risk
    LabelDetriment to RecoveryAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#DetrimentToRecoveryhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDetriment to RecoveryAccidental Misuse
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8088,25 +3021,31 @@

    Discrimination

    - + - + + + + - + - + + + + - + @@ -8121,85 +3060,61 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    None

    TermDiscriminationAuthorisationFailure Prefix risk
    LabelDiscriminationAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDiscriminationSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -8212,54 +3127,42 @@

    Distributed Denial of Service Attack (DDoS)

    - -
    -

    Eavesdropping

    +
    +

    Availability Incident

    TermDistributedDenialServiceAttackAvailabilityBreach Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)None
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionDistributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8270,34 +3173,28 @@

    Eavesdropping

    - + - - - - + - + - - - - + - @@ -8306,51 +3203,46 @@

    Eavesdropping

    -
    -

    Economic Disadvantage

    +
    +

    Avoid Source

    TermEavesdroppingAvailabilityIncident Prefix risk
    LabelEavesdroppingAvailability Incident
    IRIhttps://w3id.org/dpv/risk#Eavesdroppinghttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionEavesdroppingIncident where the availability of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -8361,7 +3253,7 @@

    Economic Disadvantage

    - + @@ -8374,18 +3266,18 @@

    Economic Disadvantage

    - + - + - @@ -8393,43 +3285,41 @@

    Economic Disadvantage

    -
    -

    Environmental Incident

    + +
    +

    Benefit

    TermEconomicDisadvantageAvoidSource Prefix risk
    LabelEconomic DisadvantageAvoid Source
    IRIhttps://w3id.org/dpv/risk#EconomicDisadvantagehttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEconomic DisadvantageControl that avoids the risk source
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -8438,7 +3328,7 @@

    Environmental Incident

    - + @@ -8451,15 +3341,21 @@

    Environmental Incident

    - + - - + + + + + + + + - @@ -8468,55 +3364,40 @@

    Environmental Incident

    -
    -

    Environmental Safety Endangerment

    +
    +

    Blackmail

    TermEnvironmentalIncidentBenefit Prefix risk
    LabelEnvironmental IncidentBenefit
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Incident + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to environmental factors outside human controlsSomething that acts as or causes benefits
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8525,7 +3406,7 @@

    Environmental Safety Endangerment

    - + @@ -8543,7 +3424,10 @@

    Environmental Safety Endangerment

    - + + + + @@ -8561,54 +3445,40 @@

    Environmental Safety Endangerment

    -
    -

    Equipment Failure

    +
    +

    Brute Force Authorisations

    TermEnvironmentalSafetyEndangermentBlackmail Prefix risk
    LabelEnvironmental Safety EndangermentBlackmail
    IRIhttps://w3id.org/dpv/risk#EnvironmentalSafetyEndangermenthttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEnvironmental Safety EndangermentSomething that acts as or causes Blackmail
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -8617,7 +3487,7 @@

    Equipment Failure

    - + @@ -8626,7 +3496,7 @@

    Equipment Failure

    - + @@ -8635,7 +3505,10 @@

    Equipment Failure

    - + + + + @@ -8653,52 +3526,50 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    + + + + +
    +

    Change Consequence

    TermEquipmentFailureBruteForceAuthorisations Prefix risk
    LabelEquipment FailureBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionEquipment FailureSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -8709,23 +3580,20 @@

    Equipment Malfunction

    - + - - - - + - + @@ -8736,7 +3604,7 @@

    Equipment Malfunction

    - @@ -8745,52 +3613,46 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Change Impact

    TermEquipmentMalfunctionChangeConsequence Prefix risk
    LabelEquipment MalfunctionChange Consequence
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionEquipment MalfunctionControl that changes Consequence
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -8801,23 +3663,20 @@

    Erroneous System Use

    - + - - - - + - + @@ -8828,7 +3687,7 @@

    Erroneous System Use

    - @@ -8837,57 +3696,40 @@

    Erroneous System Use

    - - -
    -

    Extorsion

    +
    +

    Coercion

    TermErroneousSystemUseChangeImpact Prefix risk
    LabelErroneous System UseChange Impact
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionErroneous System UseControl that changes Impact
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -8896,7 +3738,7 @@

    Extorsion

    - + @@ -8914,7 +3756,10 @@

    Extorsion

    - + + + + @@ -8932,44 +3777,40 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Compensation

    TermExtorsionCoercion Prefix risk
    LabelExtorsionCoercion
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionExtorsionSomething that acts as or causes Coercion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8978,12 +3819,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -8994,18 +3832,21 @@

    Extremely High Likelihood

    - + - + + + + - + - @@ -9014,44 +3855,40 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    +
    +

    Component Failure

    TermExtremelyHighLikelihoodCompensation Prefix risk
    LabelExtremely High LikelihoodCompensation
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely HighSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9060,11 +3897,11 @@

    Extremely High Risk

    - + - + @@ -9074,20 +3911,14 @@

    Extremely High Risk

    - - - - + - - - - + - @@ -9096,44 +3927,40 @@

    Extremely High Risk

    -
    -

    Extremely High Severity

    +
    +

    Component Malfunction

    TermExtremelyHighRiskComponentFailure Prefix risk
    LabelExtremely High RiskComponent Failure
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Component Failure
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + @@ -9142,11 +3969,11 @@

    Extremely High Severity

    - + - + @@ -9156,20 +3983,14 @@

    Extremely High Severity

    - - - - + - - - - + - @@ -9178,44 +3999,40 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Compromise Account

    TermExtremelyHighSeverityComponentMalfunction Prefix risk
    LabelExtremely High SeverityComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Component Malfunction
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9224,25 +4041,28 @@

    Extremely Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -9251,7 +4071,7 @@

    Extremely Low Likelihood

    - @@ -9260,44 +4080,40 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Compromise Account Credentials

    TermExtremelyLowLikelihoodCompromiseAccount Prefix risk
    LabelExtremely Low LikelihoodCompromise Account
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowSomething that acts as or causes a compromised account that is then used by the compromiser
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9306,25 +4122,28 @@

    Extremely Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -9333,7 +4152,7 @@

    Extremely Low Risk

    - @@ -9342,44 +4161,42 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    +
    +

    Confidentiality Breach

    TermExtremelyLowRiskCompromiseAccountCredentials Prefix risk
    LabelExtremely Low RiskCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowSomething that acts as or causes Account Credentials to be compromised
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -9388,25 +4205,28 @@

    Extremely Low Severity

    - + - - - - + - + + + + - + - + + + + @@ -9415,7 +4235,7 @@

    Extremely Low Severity

    - @@ -9423,50 +4243,42 @@

    Extremely Low Severity

    - -
    -

    Fee

    +
    +

    Confidentiality Incident

    TermExtremelyLowSeverityConfidentialityBreach Prefix risk
    LabelExtremely Low SeverityConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Confidentiality Breach
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -9477,34 +4289,28 @@

    Fee

    - + - - - - + - + - - - - + - @@ -9513,52 +4319,45 @@

    Fee

    -
    -

    Financial Equipment Costs

    +
    +

    Consequence Control

    TermFeeConfidentialityIncident Prefix risk
    LabelFeeConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + risk:hasIncident
    DefinitionFee provided as compensation (as an impact)Incident where the confidentiality of information or system has been affected
    Source
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -9569,23 +4368,20 @@

    Financial Equipment Costs

    - + - - - - + - + @@ -9596,7 +4392,7 @@

    Financial Equipment Costs

    - @@ -9605,52 +4401,45 @@

    Financial Equipment Costs

    -
    -

    Financial Investigation Costs

    +
    +

    Containment Control

    TermFinancialEquipmentCostsConsequenceControl Prefix risk
    LabelFinancial Equipment CostsConsequence Control
    IRIhttps://w3id.org/dpv/risk#FinancialEquipmentCostshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Equipment CostsRisk Mitigation Measure that controls the Consequences
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -9661,34 +4450,28 @@

    Financial Investigation Costs

    - + - - - - + - + - - - - + - @@ -9697,54 +4480,40 @@

    Financial Investigation Costs

    -
    -

    Financial Loss

    +
    +

    Copyright Violation

    TermFinancialInvestigationCostsContainmentControl Prefix risk
    LabelFinancial Investigation CostsContainment Control
    IRIhttps://w3id.org/dpv/risk#FinancialInvestigationCostshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionFinancial Investigation CostsControl to contain event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9753,7 +4522,7 @@

    Financial Loss

    - + @@ -9762,7 +4531,7 @@

    Financial Loss

    - + @@ -9771,7 +4540,10 @@

    Financial Loss

    - + + + + @@ -9786,55 +4558,46 @@

    Financial Loss

    TermFinancialLossCopyrightViolation Prefix risk
    LabelFinancial LossCopyright Violation
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial LossSomething that acts as or causes Copyright Violation
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    + + - -
    -

    Financial Personnel Costs

    +
    +

    Cross-Border Incident

    - + - + - + - + - - - - - + - @@ -9845,34 +4608,28 @@

    Financial Personnel Costs

    - + - - - - + - + - - - - + - @@ -9881,54 +4638,40 @@

    Financial Personnel Costs

    -
    -

    Financial Repair Costs

    +
    +

    Cryptojacking

    TermFinancialPersonnelCostsCrossBorderIncident Prefix risk
    LabelFinancial Personnel CostsCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#FinancialPersonnelCostshttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionFinancial Personnel CostsIncident involving cross-border or multiple jurisdictions
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -9937,7 +4680,7 @@

    Financial Repair Costs

    - + @@ -9946,7 +4689,7 @@

    Financial Repair Costs

    - + @@ -9955,7 +4698,10 @@

    Financial Repair Costs

    - + + + + @@ -9973,55 +4719,40 @@

    Financial Repair Costs

    -
    -

    Fraud

    +
    +

    Damage

    TermFinancialRepairCostsCryptojacking Prefix risk
    LabelFinancial Repair CostsCryptojacking
    IRIhttps://w3id.org/dpv/risk#FinancialRepairCostshttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFinancial Repair CostsSomething that acts as or causes Cryptojacking
    SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10030,25 +4761,25 @@

    Fraud

    - + - - - - + - + - + + + + @@ -10066,54 +4797,41 @@

    Fraud

    -
    -

    Government Crisis

    +
    +

    Data Breach

    TermFraudDamage Prefix risk
    LabelFraudDamage
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionFraudSomething that acts as or causes Damage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -10122,10 +4840,13 @@

    Government Crisis

    - + + + + @@ -10140,7 +4861,10 @@

    Government Crisis

    - + + + + @@ -10149,7 +4873,7 @@

    Government Crisis

    - @@ -10158,48 +4882,40 @@

    Government Crisis

    -
    -

    Halt Source

    +
    +

    Data Corruption

    TermGovernmentCrisisDataBreach Prefix risk
    LabelGovernment CrisisData Breach
    IRIhttps://w3id.org/dpv/risk#GovernmentCrisishttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionGovernment CrisisSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
    - + - + - + - + - - - - - + @@ -10208,22 +4924,31 @@

    Halt Source

    - + - + + + + - + + + + - + - + + + + @@ -10232,7 +4957,7 @@

    Halt Source

    - @@ -10240,53 +4965,42 @@

    Halt Source

    - -
    -

    Harm

    +
    +

    Deliberate Incident

    TermHaltSourceDataCorruption Prefix risk
    LabelHalt SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10297,7 +5011,7 @@

    Harm

    - + @@ -10310,18 +5024,15 @@

    Harm

    - + - - - - + - @@ -10330,55 +5041,40 @@

    Harm

    -
    -

    Harmful Speech

    +
    +

    Denial of Service Attack (DoS)

    TermHarmDeliberateIncident Prefix risk
    LabelHarmDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionImpact that acts as or causes harmsIncident caused due to deliberate actions of a human
    Date Created2022-08-132024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -10387,7 +5083,7 @@

    Harmful Speech

    - + @@ -10396,7 +5092,7 @@

    Harmful Speech

    - + @@ -10405,7 +5101,10 @@

    Harmful Speech

    - + + + + @@ -10423,61 +5122,45 @@

    Harmful Speech

    - - - - - - - - - - -
    -

    Health and life impact

    +
    +

    Detection Control

    TermHarmfulSpeechDenialServiceAttack Prefix risk
    LabelHarmful SpeechDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#HarmfulSpeechhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionHarmful SpeechSomething that acts as or causes Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -10488,34 +5171,28 @@

    Health and life impact

    - + - - - - + - + - - - - + - @@ -10524,52 +5201,40 @@

    Health and life impact

    -
    -

    High Likelihood

    +
    +

    Detriment

    TermHealthLifeImpactDetectionControl Prefix risk
    LabelHealth and life impactDetection Control
    IRIhttps://w3id.org/dpv/risk#HealthLifeImpacthttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionHealth and life impactControl to detect event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -10578,12 +5243,9 @@

    High Likelihood

    - + - - - - + @@ -10594,18 +5256,21 @@

    High Likelihood

    - + - + + + + - + - @@ -10614,52 +5279,40 @@

    High Likelihood

    -
    -

    High Risk

    +
    +

    Discrimination

    TermHighLikelihoodDetriment Prefix risk
    LabelHigh LikelihoodDetriment
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is HighSomething that acts as or causes Detriment
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10668,12 +5321,9 @@

    High Risk

    - + - - - - + @@ -10684,18 +5334,21 @@

    High Risk

    - + - + + + + - + - @@ -10704,52 +5357,40 @@

    High Risk

    -
    -

    High Severity

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermHighRiskDiscrimination Prefix risk
    LabelHigh RiskDiscrimination
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighSomething that acts as or causes Discrimination
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -10758,25 +5399,28 @@

    High Severity

    - + - - - - + - + + + + - + - + + + + @@ -10785,7 +5429,7 @@

    High Severity

    - @@ -10793,53 +5437,42 @@

    High Severity

    - -
    -

    Human Errors

    +
    +

    Environmental Incident

    TermHighSeverityDistributedDenialServiceAttack Prefix risk
    LabelHigh SeverityDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is HighSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -10850,34 +5483,28 @@

    Human Errors

    - + - - - - + - + - - - - + - @@ -10886,47 +5513,39 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Environmental Risk

    TermHumanErrorsEnvironmentalIncident Prefix risk
    LabelHuman ErrorsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionHuman ErrorsIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -10935,7 +5554,7 @@

    Identification Control

    - + @@ -10946,17 +5565,14 @@

    Identification Control

    - - - - + - @@ -10965,54 +5581,40 @@

    Identification Control

    -
    -

    Identity Dispute

    +
    +

    Equipment Failure

    TermIdentificationControlEnvironmentalRisk Prefix risk
    LabelIdentification ControlEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11021,22 +5623,31 @@

    Identity Dispute

    - + - + + + + - + + + + - + - + + + + @@ -11054,55 +5665,40 @@

    Identity Dispute

    -
    -

    Identity Fraud

    +
    +

    Equipment Malfunction

    TermIdentityDisputeEquipmentFailure Prefix risk
    LabelIdentity DisputeEquipment Failure
    IRIhttps://w3id.org/dpv/risk#IdentityDisputehttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity DisputeSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-242022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11111,16 +5707,19 @@

    Identity Fraud

    - + - + + + + - + @@ -11129,7 +5728,10 @@

    Identity Fraud

    - + + + + @@ -11147,55 +5749,40 @@

    Identity Fraud

    -
    -

    Identity Theft

    +
    +

    Erroneous System Use

    TermIdentityFraudEquipmentMalfunction Prefix risk
    LabelIdentity FraudEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity FraudSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11204,7 +5791,7 @@

    Identity Theft

    - + @@ -11213,7 +5800,7 @@

    Identity Theft

    - + @@ -11222,7 +5809,10 @@

    Identity Theft

    - + + + + @@ -11240,54 +5830,42 @@

    Identity Theft

    -
    -

    Illegal Processing of Data

    + + +
    +

    Exposure to Harmful Speech

    TermIdentityTheftErroneousSystemUse Prefix risk
    LabelIdentity TheftErroneous System Use
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIdentity TheftSomething that acts as or causes Erroneous System Use
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -11296,16 +5874,19 @@

    Illegal Processing of Data

    - + - + + + + - + @@ -11314,7 +5895,10 @@

    Illegal Processing of Data

    - + + + + @@ -11332,47 +5916,39 @@

    Illegal Processing of Data

    -
    -

    Impact Control

    +
    +

    External Security Threat

    TermIllegalProcessingDataExposureToHarmfulSpeech Prefix risk
    LabelIllegal Processing of DataExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#IllegalProcessingDatahttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIllegal Processing of DataSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -11381,7 +5957,7 @@

    Impact Control

    - + @@ -11392,20 +5968,14 @@

    Impact Control

    - - - - + - - - - + - @@ -11414,53 +5984,40 @@

    Impact Control

    -
    -

    Impact on Data Subject

    +
    +

    Extorsion

    TermImpactControlExternalSecurityThreat Prefix risk
    LabelImpact ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -11469,25 +6026,31 @@

    Impact on Data Subject

    - + - + + + + - + - + + + + - + @@ -11502,51 +6065,42 @@

    Impact on Data Subject

    -
    -

    Impact to Rights

    +
    +

    Extremely High Likelihood

    TermImpactOnDataSubjectExtorsion Prefix risk
    LabelImpact on Data SubjectExtorsion
    IRIhttps://w3id.org/dpv/risk#ImpactOnDataSubjecthttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact on Data SubjectSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-10-222022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Georg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -11557,23 +6111,23 @@

    Impact to Rights

    - + - + + + + - - - - + - + @@ -11584,7 +6138,7 @@

    Impact to Rights

    - @@ -11592,38 +6146,43 @@

    Impact to Rights

    -
    -

    Incident

    + +
    +

    Extremely High Risk

    TermImpactToRightsExtremelyHighLikelihood Prefix risk
    LabelImpact to RightsExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#ImpactToRightshttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Risk + risk:7LikelihoodLevels + → dpv:Likelihood
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasLikelihood
    DefinitionImpact to RightsLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + - @@ -11634,16 +6193,13 @@

    Incident

    - + - + - - - @@ -11653,68 +6209,62 @@

    Incident

    - + - + -
    TermIncidentExtremelyHighRisk Prefix risk
    LabelIncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionAn actual or occured eventLevel where Risk is Extremely High
    Usage NoteIncident is realised or materialised riskThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-05-192022-08-18
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-LEVELS in RISK
    - - -
    -

    Incident Assessment Report

    + +
    +

    Extremely High Severity

    - + - + - + - + - - @@ -11725,9 +6275,12 @@

    Incident Assessment Report

    - + - + + + + @@ -11738,15 +6291,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -11755,44 +6311,42 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Extremely Low Likelihood

    TermIncidentAssessmentReportExtremelyHighSeverity Prefix risk
    LabelIncident Assessment ReportExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11803,9 +6357,12 @@

    Incident Concluded

    - + - + + + + @@ -11816,7 +6373,7 @@

    Incident Concluded

    - + @@ -11827,7 +6384,7 @@

    Incident Concluded

    - @@ -11835,46 +6392,43 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Extremely Low Risk

    TermIncidentConcludedExtremelyLowLikelihood Prefix risk
    LabelIncident ConcludedExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11885,9 +6439,12 @@

    Incident Concluding Report

    - + - + + + + @@ -11898,15 +6455,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -11914,46 +6474,43 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + +
    +

    Extremely Low Severity

    TermIncidentConcludingReportExtremelyLowRisk Prefix risk
    LabelIncident Concluding ReportExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -11964,9 +6521,12 @@

    Incident Detection Report

    - + - + + + + @@ -11977,15 +6537,18 @@

    Incident Detection Report

    - + - + + + + - @@ -11994,46 +6557,40 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Fee

    TermIncidentDetectionReportExtremelyLowSeverity Prefix risk
    LabelIncident Detection ReportExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionA report describing the detection of a IncidentLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12042,31 +6599,37 @@

    Incident Halted

    - + - + + + + - + - + + + + - + - @@ -12074,48 +6637,40 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Financial Impact

    TermIncidentHaltedFee Prefix risk
    LabelIncident HaltedFee
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#Fee
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or provides fees e.g. for using a service
    Source
    Date Created2024-02-142024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12124,7 +6679,7 @@

    Incident Handling Report

    - + @@ -12135,17 +6690,14 @@

    Incident Handling Report

    - - - - + - @@ -12153,33 +6705,38 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Financial Loss

    TermIncidentHandlingReportFinancialImpact Prefix risk
    LabelIncident Handling ReportFinancial Impact
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceThings that cause or have the potential to impact financial resources
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -12191,28 +6748,37 @@

    Incident Identifier

    - + - + + + + - + - - + + + + + + + + - @@ -12220,51 +6786,41 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Fraud

    TermIncidentIdentifierFinancialLoss Prefix risk
    LabelIncident IdentifierFinancial Loss
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incidentSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -12273,22 +6829,28 @@

    Incident Impact Assessment

    - + - + + + + - + - + + + + @@ -12297,7 +6859,7 @@

    Incident Impact Assessment

    - @@ -12306,44 +6868,46 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    +
    +

    Halt Source

    TermIncidentImpactAssessmentFraud Prefix risk
    LabelIncident Impact AssessmentFraud
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentSomething that acts as or causes Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12354,7 +6918,7 @@

    Incident Mitigated

    - + @@ -12367,7 +6931,7 @@

    Incident Mitigated

    - + @@ -12378,7 +6942,7 @@

    Incident Mitigated

    - @@ -12386,45 +6950,40 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + +
    +

    Harm

    TermIncidentMitigatedHaltSource Prefix risk
    LabelIncident MitigatedHalt Source
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringControl that halts the risk source or prevents it from materialising
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12433,9 +6992,12 @@

    Incident Mitigation Measure

    - + - + + + + @@ -12446,15 +7008,21 @@

    Incident Mitigation Measure

    - + - - + + + + + + + + - @@ -12463,44 +7031,60 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + + + + + + +
    +

    High Likelihood

    TermIncidentMitigationMeasureHarm Prefix risk
    LabelIncident Mitigation MeasureHarm
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2024-05-192022-08-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -12511,9 +7095,12 @@

    Incident Near Miss

    - + - + + + + @@ -12524,7 +7111,7 @@

    Incident Near Miss

    - + @@ -12535,7 +7122,7 @@

    Incident Near Miss

    - @@ -12543,45 +7130,51 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + +
    +

    High Risk

    TermIncidentNearMissHighLikelihood Prefix risk
    LabelIncident Near MissHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasLikelihood
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Level where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12592,9 +7185,12 @@

    Incident Notice

    - + - + + + + @@ -12605,15 +7201,18 @@

    Incident Notice

    - + - + + + + - @@ -12622,44 +7221,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    +
    +

    High Severity

    TermIncidentNoticeHighRisk Prefix risk
    LabelIncident NoticeHigh Risk
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionNotice associated with an IncidentLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -12670,9 +7275,12 @@

    Incident Ongoing

    - + - + + + + @@ -12683,7 +7291,7 @@

    Incident Ongoing

    - + @@ -12694,7 +7302,7 @@

    Incident Ongoing

    - @@ -12702,48 +7310,41 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + +
    +

    Human Errors

    TermIncidentOngoingHighSeverity Prefix risk
    LabelIncident OngoingHigh Severity
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionThe incident is ongoing i.e. still activeLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -12752,28 +7353,37 @@

    Incident Ongoing Report

    - + - + + + + - + - - + + + + + + + + - @@ -12781,46 +7391,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + +
    +

    Identification Control

    TermIncidentOngoingReportHumanErrors Prefix risk
    LabelIncident Ongoing ReportHuman Errors
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -12831,7 +7441,7 @@

    Incident Preliminary Report

    - + @@ -12852,7 +7462,7 @@

    Incident Preliminary Report

    - @@ -12860,47 +7470,41 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Identity Fraud

    TermIncidentPreliminaryReportIdentificationControl Prefix risk
    LabelIncident Preliminary ReportIdentification Control
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -12909,22 +7513,28 @@

    Incident Register

    - + - + + + + - + - + + + + @@ -12933,7 +7543,7 @@

    Incident Register

    - @@ -12941,47 +7551,41 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Identity Theft

    TermIncidentRegisterIdentityFraud Prefix risk
    LabelIncident RegisterIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - + + + + @@ -12990,28 +7594,37 @@

    Incident Report

    - + - + + + + - + - - + + + + + + + + - @@ -13019,45 +7632,41 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Illegal Data Processing

    TermIncidentReportIdentityTheft Prefix risk
    LabelIncident ReportIdentity Theft
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -13066,25 +7675,31 @@

    Incident Status

    - + + + + + - - - - - + + + + - + - + + + + @@ -13093,7 +7708,7 @@

    Incident Status

    - @@ -13102,44 +7717,45 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Impact Control

    TermIncidentStatusIllegalDataProcessing Prefix risk
    LabelIncident StatusIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Status - → dpv:Context + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - @@ -13150,7 +7766,7 @@

    Incident Status Unknown

    - + @@ -13163,7 +7779,7 @@

    Incident Status Unknown

    - + @@ -13174,7 +7790,7 @@

    Incident Status Unknown

    - @@ -13182,45 +7798,41 @@

    Incident Status Unknown

    - -
    -

    Incident Suspected

    +
    +

    Incident

    TermIncidentStatusUnknownImpactControl Prefix risk
    LabelIncident Status UnknownImpact Control
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownRisk Mitigation Measure that controls Impacts
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -13231,10 +7843,16 @@

    Incident Suspected

    - + + + + + - + + + @@ -13246,40 +7864,46 @@

    Incident Suspected

    - + + + + - + -
    TermIncidentSuspectedIncident Prefix risk
    LabelIncident SuspectedIncident
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section INCIDENT-STATUS in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + -
    -

    Incident Suspected Report

    +
    +

    Incident Assessment Report

    - + - + - + @@ -13313,7 +7937,7 @@

    Incident Suspected Report

    - + @@ -13343,23 +7967,23 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Incident Concluded

    TermIncidentSuspectedReportIncidentAssessmentReport Prefix risk
    LabelIncident Suspected ReportIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#IncidentAssessmentReport
    DefinitionA report describing the suspicion of an incident in the past or occuringA report describing the assessment of an incident in terms of its effects or impacts
    - + - + - + @@ -13391,7 +8015,7 @@

    Incident Terminated

    - + @@ -13423,53 +8047,46 @@

    Incident Terminated

    - -
    -

    Increase Internal Cost

    +
    +

    Incident Concluding Report

    TermIncidentTerminatedIncidentConcluded Prefix risk
    LabelIncident TerminatedIncident Concluded
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#IncidentConcluded
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + - @@ -13480,34 +8097,28 @@

    Increase Internal Cost

    - + - - - - + - + - - - - + - @@ -13515,53 +8126,46 @@

    Increase Internal Cost

    - -
    -

    Industrial Crisis

    +
    +

    Incident Detection Report

    TermIncreaseInternalCostIncidentConcludingReport Prefix risk
    LabelIncrease Internal CostIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#IncreaseInternalCosthttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncrease Internal CostA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13572,34 +8176,28 @@

    Industrial Crisis

    - + - - - - + - + - - - - + - @@ -13608,53 +8206,44 @@

    Industrial Crisis

    -
    -

    Injury

    +
    +

    Incident Halted

    TermIndustrialCrisisIncidentDetectionReport Prefix risk
    LabelIndustrial CrisisIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#IndustrialCrisishttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIndustrial CrisisA report describing the detection of a Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13665,23 +8254,20 @@

    Injury

    - + - - - - + - + @@ -13692,7 +8278,7 @@

    Injury

    - @@ -13700,23 +8286,23 @@

    Injury

    -
    -

    Integrity Incident

    +
    +

    Incident Handling Report

    TermInjuryIncidentHalted Prefix risk
    LabelInjuryIncident Halted
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionInjuryThe incident has halted or paused with a high likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13728,13 +8314,18 @@

    Integrity Incident

    - - @@ -13745,7 +8336,7 @@

    Integrity Incident

    - + @@ -13774,55 +8365,36 @@

    Integrity Incident

    - -
    -

    Interception of Communications

    +
    +

    Incident Identifier

    TermIntegrityIncidentIncidentHandlingReport Prefix risk
    LabelIntegrity IncidentIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#IncidentHandlingReport
    Broader/Parent types risk:Incident + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident where the integrity of information or system has been affectedA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    - + - + - + - + - - - - - - - - - - - + + + @@ -13831,34 +8403,28 @@

    Interception of Communications

    - + - - - - + - + - - - - + - @@ -13866,53 +8432,49 @@

    Interception of Communications

    - -
    -

    Internal Operation Disruption

    +
    +

    Incident Impact Assessment

    TermInterceptionCommunicationsIncidentIdentifier Prefix risk
    LabelInterception of CommunicationsIncident Identifier
    IRIhttps://w3id.org/dpv/risk#InterceptionCommunicationshttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInterception of CommunicationsIdentifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -13923,23 +8485,20 @@

    Internal Operation Disruption

    - + - - - - + - + @@ -13950,7 +8509,7 @@

    Internal Operation Disruption

    - @@ -13959,56 +8518,44 @@

    Internal Operation Disruption

    - - - - -
    -

    Known Vulnerability Exploited

    +
    +

    Incident Mitigated

    TermInternalOperationDisruptionIncidentImpactAssessment Prefix risk
    LabelInternal Operation DisruptionIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#InternalOperationDisruptionhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionInternal Operation DisruptionAn impact assessment associated with a incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14019,23 +8566,20 @@

    Known Vulnerability Exploited

    - + - - - - + - + @@ -14046,7 +8590,7 @@

    Known Vulnerability Exploited

    - @@ -14054,53 +8598,43 @@

    Known Vulnerability Exploited

    - -
    -

    Law Enforcement Adverse Effects

    +
    +

    Incident Mitigation Measure

    TermKnownVulnerabilityExploitedIncidentMitigated Prefix risk
    LabelKnown Vulnerability ExploitedIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#KnownVulnerabilityExploitedhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionKnown Vulnerability ExploitedThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14111,34 +8645,28 @@

    Law Enforcement Adverse Effects

    - + - - - - + - + - - - - + - @@ -14147,53 +8675,44 @@

    Law Enforcement Adverse Effects

    -
    -

    Limitation of Rights

    +
    +

    Incident Near Miss

    TermLawEnforcementAdverseEffectsIncidentMitigationMeasure Prefix risk
    LabelLaw Enforcement Adverse EffectsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#LawEnforcementAdverseEffectshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure
    DefinitionLaw Enforcement Adverse EffectsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14204,7 +8723,7 @@

    Limitation of Rights

    - + @@ -14217,18 +8736,18 @@

    Limitation of Rights

    - + - + - @@ -14236,54 +8755,45 @@

    Limitation of Rights

    - -
    -

    Loss of Assets

    +
    +

    Incident Notice

    TermLimitationOfRightsIncidentNearMiss Prefix risk
    LabelLimitation of RightsIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#LimitationOfRightshttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLimitation of RightsThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2022-08-182024-02-14
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -14294,34 +8804,28 @@

    Loss of Assets

    - + - - - - + - + - - - - + - @@ -14330,53 +8834,44 @@

    Loss of Assets

    -
    -

    Loss of Competitive Advantage

    +
    +

    Incident Ongoing

    TermLossAssetsIncidentNotice Prefix risk
    LabelLoss of AssetsIncident Notice
    IRIhttps://w3id.org/dpv/risk#LossAssetshttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of AssetsNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14387,23 +8882,20 @@

    Loss of Competitive Advantage

    - + - - - - + - + @@ -14414,7 +8906,7 @@

    Loss of Competitive Advantage

    - @@ -14422,54 +8914,46 @@

    Loss of Competitive Advantage

    - -
    -

    Loss of Control over Data

    +
    +

    Incident Ongoing Report

    TermLossCompetitiveAdvantageIncidentOngoing Prefix risk
    LabelLoss of Competitive AdvantageIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#LossCompetitiveAdvantagehttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Competitive AdvantageThe incident is ongoing i.e. still active
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - + + - @@ -14480,7 +8964,7 @@

    Loss of Control over Data

    - + @@ -14493,18 +8977,15 @@

    Loss of Control over Data

    - + - - - - + - @@ -14512,53 +8993,46 @@

    Loss of Control over Data

    - -
    -

    Loss of Credibility

    +
    +

    Incident Preliminary Report

    TermLossControlOverDataIncidentOngoingReport Prefix risk
    LabelLoss of Control over DataIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#LossControlOverDatahttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Control over DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2022-08-192024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14569,34 +9043,28 @@

    Loss of Credibility

    - + - - - - + - + - - - - + - @@ -14604,53 +9072,45 @@

    Loss of Credibility

    - -
    -

    Loss of Customer Confidence

    +
    +

    Incident Register

    TermLossCredibilityIncidentPreliminaryReport Prefix risk
    LabelLoss of CredibilityIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#LossCredibilityhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CredibilityA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14661,23 +9121,20 @@

    Loss of Customer Confidence

    - + - - - - + - + @@ -14688,7 +9145,7 @@

    Loss of Customer Confidence

    - @@ -14696,54 +9153,45 @@

    Loss of Customer Confidence

    - -
    -

    Loss of Customers

    +
    +

    Incident Report

    TermLossCustomerConfidenceIncidentRegister Prefix risk
    LabelLoss of Customer ConfidenceIncident Register
    IRIhttps://w3id.org/dpv/risk#LossCustomerConfidencehttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of Customer ConfidenceA register recording incidentes, their reports, notifications, and other related activities
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14754,34 +9202,28 @@

    Loss of Customers

    - + - - - - + - + - - - - + - @@ -14789,54 +9231,43 @@

    Loss of Customers

    - -
    -

    Loss of Data

    +
    +

    Incident Status

    TermLossCustomersIncidentReport Prefix risk
    LabelLoss of CustomersIncident Report
    IRIhttps://w3id.org/dpv/risk#LossCustomershttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of CustomersDocumented information about an incident, its handling, assessments,and notifications
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -14847,23 +9278,23 @@

    Loss of Data

    - + + + + - - - - + - + @@ -14874,7 +9305,7 @@

    Loss of Data

    - @@ -14883,53 +9314,44 @@

    Loss of Data

    -
    -

    Loss of Funds

    +
    +

    Incident Status Unknown

    TermLossDataIncidentStatus Prefix risk
    LabelLoss of DataIncident Status
    IRIhttps://w3id.org/dpv/risk#LossDatahttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of DataStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - - - - + - @@ -14940,23 +9362,20 @@

    Loss of Funds

    - + - - - - + - + @@ -14967,7 +9386,7 @@

    Loss of Funds

    - @@ -14976,53 +9395,44 @@

    Loss of Funds

    -
    -

    Loss of Goods

    +
    +

    Incident Suspected

    TermLossFundsIncidentStatusUnknown Prefix risk
    LabelLoss of FundsIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#LossFundshttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of FundsThe status of a incident is unknown
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15033,23 +9443,20 @@

    Loss of Goods

    - + - - - - + - + @@ -15060,7 +9467,7 @@

    Loss of Goods

    - @@ -15068,53 +9475,46 @@

    Loss of Goods

    - -
    -

    Loss of Goodwill

    +
    +

    Incident Suspected Report

    TermLossGoodsIncidentSuspected Prefix risk
    LabelLoss of GoodsIncident Suspected
    IRIhttps://w3id.org/dpv/risk#LossGoodshttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of GoodsThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - + - @@ -15125,34 +9525,28 @@

    Loss of Goodwill

    - + - - - - + - + - - - - + - @@ -15161,52 +9555,44 @@

    Loss of Goodwill

    -
    -

    Loss of Negotiating Capacity

    +
    +

    Incident Terminated

    TermLossGoodwillIncidentSuspectedReport Prefix risk
    LabelLoss of GoodwillIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#LossGoodwillhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLoss of GoodwillA report describing the suspicion of an incident in the past or occuring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + - @@ -15217,23 +9603,20 @@

    Loss of Negotiating Capacity

    - + - - - - - - + + + - + @@ -15244,7 +9627,7 @@

    Loss of Negotiating Capacity

    - @@ -15253,85 +9636,58 @@

    Loss of Negotiating Capacity

    -
    -

    Loss of Opportunity

    +
    +

    Individual Health & Safety

    TermLossNegotiatingCapacityIncidentTerminated Prefix risk
    LabelLoss of Negotiating CapacityIncident Terminated
    IRIhttps://w3id.org/dpv/risk#LossNegotiatingCapacityhttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasContext, + dpv:hasStatus
    DefinitionLoss of Negotiating CapacityThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15344,56 +9700,36 @@

    Loss of Opportunity

    - -
    -

    Loss of Proprietary Information

    +
    +

    Individual Risk

    TermLossOpportunityIndividualHealthSafety Prefix risk
    LabelLoss of OpportunityIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#LossOpportunityhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - - - + + + @@ -15402,29 +9738,20 @@

    Loss of Proprietary Information

    - + - - - - + - - - - + - - - - + @@ -15438,54 +9765,39 @@

    Loss of Proprietary Information

    -
    -

    Loss of Reputation

    +
    +

    Injury

    TermLossProprietaryInformationIndividualRisk Prefix risk
    LabelLoss of Proprietary InformationIndividual Risk
    IRIhttps://w3id.org/dpv/risk#LossProprietaryInformationhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Proprietary InformationRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15494,7 +9806,7 @@

    Loss of Reputation

    - + @@ -15512,7 +9824,10 @@

    Loss of Reputation

    - + + + + @@ -15530,86 +9845,61 @@

    Loss of Reputation

    -
    -

    Loss of Resources

    +
    +

    None

    TermLossReputationInjury Prefix risk
    LabelLoss of ReputationInjury
    IRIhttps://w3id.org/dpv/risk#LossReputationhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of ReputationSomething that acts as or causes Injury
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -15622,54 +9912,42 @@

    Loss of Resources

    - -
    -

    Loss of Suppliers

    +
    +

    Integrity Incident

    TermLossResourcesIntegrityBreach Prefix risk
    LabelLoss of ResourcesNone
    IRIhttps://w3id.org/dpv/risk#LossResourceshttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Resources
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -15680,34 +9958,28 @@

    Loss of Suppliers

    - + - - - - + - + - - - - + - @@ -15716,55 +9988,40 @@

    Loss of Suppliers

    -
    -

    Loss of Technological Advantage

    +
    +

    Intentional Misuse

    TermLossSuppliersIntegrityIncident Prefix risk
    LabelLoss of SuppliersIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#LossSuppliershttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:Incident + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:hasIncident
    DefinitionLoss of SuppliersIncident where the integrity of information or system has been affected
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - - - + + @@ -15773,29 +10030,20 @@

    Loss of Technological Advantage

    - + - - - - + - - - - + - - - - + @@ -15809,54 +10057,40 @@

    Loss of Technological Advantage

    -
    -

    Loss of Trust

    +
    +

    Intercept Communications

    TermLossTechnologicalAdvantageIntentionalMisuse Prefix risk
    LabelLoss of Technological AdvantageIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#LossTechnologicalAdvantagehttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:UserRisks + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of Technological AdvantageIntentional Misuse
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -15865,9 +10099,12 @@

    Loss of Trust

    - + - + + + + @@ -15883,7 +10120,10 @@

    Loss of Trust

    - + + + + @@ -15901,52 +10141,39 @@

    Loss of Trust

    -
    -

    Low Likelihood

    +
    +

    Internal Security Threat

    TermLossTrustInterceptCommunications Prefix risk
    LabelLoss of TrustIntercept Communications
    IRIhttps://w3id.org/dpv/risk#LossTrusthttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionLoss of TrustSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -15955,12 +10182,9 @@

    Low Likelihood

    - + - - - - + @@ -15969,20 +10193,14 @@

    Low Likelihood

    - - - - + - - - - + - @@ -15991,52 +10209,44 @@

    Low Likelihood

    -
    -

    Low Risk

    + + + + +
    +

    Judicial Costs

    TermLowLikelihoodInternalSecurityThreat Prefix risk
    LabelLow LikelihoodInternal Security Threat
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#InternalSecurityThreat
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowConcepts associated with security threats and issues that originate within the organisation
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - - - - - - - - - - - + + + + + + + - - - - - + @@ -16045,12 +10255,9 @@

    Low Risk

    - + - - - - + @@ -16059,20 +10266,14 @@

    Low Risk

    - - - - + - - - - + - @@ -16081,52 +10282,40 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Judicial Penalty

    TermLowRiskJudicialCosts Prefix risk
    LabelLow RiskJudicial Costs
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that involves or causes judicial costs to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16135,12 +10324,9 @@

    Low Severity

    - + - - - - + @@ -16149,20 +10335,14 @@

    Low Severity

    - - - - + - - - - + - @@ -16171,54 +10351,39 @@

    Low Severity

    -
    -

    Malicious Code Attack

    +
    +

    Legal Risk

    TermLowSeverityJudicialPenalty Prefix risk
    LabelLow SeverityJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowSomething that involves or causes judicial penalties to be paid
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -16227,29 +10392,20 @@

    Malicious Code Attack

    - + - - - - + - - - - + - - - - + @@ -16263,54 +10419,40 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Lose of Credibility

    TermMaliciousCodeAttackLegalRisk Prefix risk
    LabelMalicious Code AttackLegal Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionIntentional use of software by including or inserting in a system for a harmful purposeRisks and issues that have their basis in legal requirements and enforcement
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16319,7 +10461,7 @@

    Malware Attack

    - + @@ -16328,7 +10470,7 @@

    Malware Attack

    - + @@ -16337,7 +10479,10 @@

    Malware Attack

    - + + + + @@ -16355,54 +10500,40 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Lose of Customer Confidence

    TermMalwareAttackLoseCredibility Prefix risk
    LabelMalware AttackLose of Credibility
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMalware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a systemSomething that acts as or causes Loss of Credibility
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16411,22 +10542,28 @@

    Material Damage

    - + - + + + + - + - + + + + @@ -16444,54 +10581,40 @@

    Material Damage

    -
    -

    Misinformation and Disinformation

    +
    +

    Lose of Goodwill

    TermMaterialDamageLoseCustomerConfidence Prefix risk
    LabelMaterial DamageLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionImpact that acts as or causes material damagesSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-03-302022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16500,7 +10623,7 @@

    Misinformation and Disinformation

    - + @@ -16509,7 +10632,7 @@

    Misinformation and Disinformation

    - + @@ -16518,7 +10641,10 @@

    Misinformation and Disinformation

    - + + + + @@ -16536,53 +10662,40 @@

    Misinformation and Disinformation

    -
    -

    Misuse

    +
    +

    Lose of Negotiating Capacity

    TermMisinformationDisinformationLoseGoodwill Prefix risk
    LabelMisinformation and DisinformationLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#MisinformationDisinformationhttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionInformation that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)Something that acts as or causes Loss of Goodwill
    SourceENISA Threat Landscape 2021ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16591,25 +10704,31 @@

    Misuse

    - + - + + + + - + - + + + + - + @@ -16624,54 +10743,40 @@

    Misuse

    -
    -

    Misuse of Breached Information

    +
    +

    Lose of Opportunity

    TermMisuseLoseNegotiatingCapacity Prefix risk
    LabelMisuseLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuseSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-06-112022-08-17
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -16680,7 +10785,7 @@

    Misuse of Breached Information

    - + @@ -16698,7 +10803,10 @@

    Misuse of Breached Information

    - + + + + @@ -16716,52 +10824,40 @@

    Misuse of Breached Information

    -
    -

    Moderate Likelihood

    +
    +

    Lose of Reputation

    TermMisuseBreachedInformationLoseOpportunity Prefix risk
    LabelMisuse of Breached InformationLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#MisuseBreachedInformationhttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ReputationalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionMisuse of Breached InformationSomething that acts as or causes Loss of Opportunity
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -16770,25 +10866,28 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -16797,7 +10896,7 @@

    Moderate Likelihood

    - @@ -16806,52 +10905,40 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    +
    +

    Lose of Trust

    TermModerateLikelihoodLoseReputation Prefix risk
    LabelModerate LikelihoodLose of Reputation
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateSomething that acts as or causes Loss of Reputation
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + @@ -16860,25 +10947,28 @@

    Moderate Risk

    - + - - - - + - + + + + - + - + + + + @@ -16887,7 +10977,7 @@

    Moderate Risk

    - @@ -16896,50 +10986,50 @@

    Moderate Risk

    -
    -

    Moderate Severity

    +
    +

    Low Likelihood

    TermModerateRiskLoseTrust Prefix risk
    LabelModerate RiskLose of Trust
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Loss of Trust
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - @@ -16950,11 +11040,11 @@

    Moderate Severity

    - + - + @@ -16986,46 +11076,50 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Low Risk

    TermModerateSeverityLowLikelihood Prefix risk
    LabelModerate SeverityLow Likelihood
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity + risk:3LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasSeverity + dpv:hasLikelihood
    DefinitionLevel where Severity is ModerateLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    - + - + - + - + - + + + + - @@ -17036,9 +11130,12 @@

    Monitor Consequence

    - + - + + + + @@ -17049,7 +11146,7 @@

    Monitor Consequence

    - + @@ -17060,7 +11157,7 @@

    Monitor Consequence

    - @@ -17069,45 +11166,50 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Low Severity

    TermMonitorConsequenceLowRisk Prefix risk
    LabelMonitor ConsequenceLow Risk
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that monitors a Risk ConsequenceLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -17118,11 +11220,11 @@

    Monitor Control

    - + - + @@ -17134,7 +11236,7 @@

    Monitor Control

    - + @@ -17145,7 +11247,7 @@

    Monitor Control

    - @@ -17154,48 +11256,40 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Malicious Code Attack

    TermMonitorControlLowSeverity Prefix risk
    LabelMonitor ControlLow Severity
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsLevel where Severity is Low
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -17204,22 +11298,28 @@

    Monitor Impact

    - + - + + + + - + - + + + + @@ -17228,7 +11328,7 @@

    Monitor Impact

    - @@ -17237,48 +11337,40 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Malware Attack

    TermMonitorImpactMaliciousCodeAttack Prefix risk
    LabelMonitor ImpactMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17287,22 +11379,28 @@

    Monitor Risk

    - + - + + + + - + - + + + + @@ -17311,7 +11409,7 @@

    Monitor Risk

    - @@ -17320,48 +11418,40 @@

    Monitor Risk

    -
    -

    Monitor Control

    +
    +

    Material Damage

    TermMonitorRiskMalwareAttack Prefix risk
    LabelMonitor RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskSomething that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17370,9 +11460,12 @@

    Monitor Control

    - + - + + + + @@ -17383,9 +11476,12 @@

    Monitor Control

    - + - + + + + @@ -17394,7 +11490,7 @@

    Monitor Control

    - @@ -17403,48 +11499,40 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    +
    +

    Misuse

    TermMonitorRiskControlMaterialDamage Prefix risk
    LabelMonitor ControlMaterial Damage
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -17453,7 +11541,7 @@

    Monitor Risk Source

    - + @@ -17466,18 +11554,21 @@

    Monitor Risk Source

    - + - + + + + - + - @@ -17486,46 +11577,50 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    +
    +

    Moderate Likelihood

    TermMonitorRiskSourceMisuse Prefix risk
    LabelMonitor Risk SourceMisuse
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + + - @@ -17536,9 +11631,12 @@

    Monitor Vulnerabilities

    - + - + + + + @@ -17549,7 +11647,7 @@

    Monitor Vulnerabilities

    - + @@ -17560,7 +11658,7 @@

    Monitor Vulnerabilities

    - @@ -17569,52 +11667,50 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    +
    +

    Moderate Risk

    TermMonitorVulnerabilitiesModerateLikelihood Prefix risk
    LabelMonitor VulnerabilitiesModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that monitors a Risk VulnerabilityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17625,9 +11721,12 @@

    Non-Material Damage

    - + - + + + + @@ -17638,7 +11737,7 @@

    Non-Material Damage

    - + @@ -17649,7 +11748,7 @@

    Non-Material Damage

    - @@ -17658,52 +11757,50 @@

    Non-Material Damage

    -
    -

    Organisation Disruption

    +
    +

    Moderate Severity

    TermNonMaterialDamageModerateRisk Prefix risk
    LabelNon-Material DamageModerate Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Damage - → dpv:Risk + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasRiskLevel
    DefinitionImpact that acts as or causes non-material damagesLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - - - - + - @@ -17714,23 +11811,23 @@

    Organisation Disruption

    - + - + + + + - - - - + - + @@ -17741,7 +11838,7 @@

    Organisation Disruption

    - @@ -17750,49 +11847,46 @@

    Organisation Disruption

    -
    -

    Payment

    +
    +

    Monitor Consequence

    TermOrganisationDisruptionModerateSeverity Prefix risk
    LabelOrganisation DisruptionModerate Severity
    IRIhttps://w3id.org/dpv/risk#OrganisationDisruptionhttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasSeverity
    DefinitionOrganisation DisruptionLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + - @@ -17803,7 +11897,7 @@

    Payment

    - + @@ -17816,18 +11910,18 @@

    Payment

    - + - + - @@ -17836,53 +11930,45 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Monitor Control

    TermPaymentMonitorConsequence Prefix risk
    LabelPaymentMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPayment provided as compensation (as an impact)Control that monitors a Risk Consequence
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17893,23 +11979,23 @@

    Personal Safety Endangerment

    - + - + + + + - - - - + - + @@ -17920,7 +12006,7 @@

    Personal Safety Endangerment

    - @@ -17929,53 +12015,46 @@

    Personal Safety Endangerment

    -
    -

    Personnel Absence

    +
    +

    Monitor Impact

    TermPersonalSafetyEndangermentMonitorControl Prefix risk
    LabelPersonal Safety EndangermentMonitor Control
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonal Safety EndangermentRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -17986,23 +12065,20 @@

    Personnel Absence

    - + - - - - + - + @@ -18013,7 +12089,7 @@

    Personnel Absence

    - @@ -18022,53 +12098,46 @@

    Personnel Absence

    -
    -

    Phishing Scam

    +
    +

    Monitor Risk

    TermPersonnelAbsenceMonitorImpact Prefix risk
    LabelPersonnel AbsenceMonitor Impact
    IRIhttps://w3id.org/dpv/risk#PersonnelAbsencehttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPersonnel AbsenceControl that monitors a Risk Impact
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18079,23 +12148,20 @@

    Phishing Scam

    - + - - - - + - + @@ -18106,7 +12172,7 @@

    Phishing Scam

    - @@ -18115,53 +12181,46 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Monitor Control

    TermPhishingScamMonitorRisk Prefix risk
    LabelPhishing ScamMonitor Risk
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA type of social engineering attack involving deceptive messages intended to reveal sensitive informationControl that monitors a Risk
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18172,23 +12231,20 @@

    Physical Assault

    - + - - - - + - + @@ -18199,7 +12255,7 @@

    Physical Assault

    - @@ -18208,53 +12264,46 @@

    Physical Assault

    -
    -

    Physical Spying

    +
    +

    Monitor Risk Source

    TermPhysicalAssaultMonitorRiskControl Prefix risk
    LabelPhysical AssaultMonitor Control
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical AssaultControl that monitors another Control
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18265,23 +12314,20 @@

    Physical Spying

    - + - - - - + - + @@ -18292,7 +12338,7 @@

    Physical Spying

    - @@ -18301,53 +12347,46 @@

    Physical Spying

    -
    -

    Physical Stalking

    +
    +

    Monitor Vulnerabilities

    TermPhysicalSpyingMonitorRiskSource Prefix risk
    LabelPhysical SpyingMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#PhysicalSpyinghttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical SpyingControl that monitors a Risk Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -18358,23 +12397,20 @@

    Physical Stalking

    - + - - - - + - + @@ -18385,7 +12421,7 @@

    Physical Stalking

    - @@ -18394,55 +12430,40 @@

    Physical Stalking

    -
    -

    Prevent Exercising of Rights

    +
    +

    Non-Material Damage

    TermPhysicalStalkingMonitorVulnerabilities Prefix risk
    LabelPhysical StalkingMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#PhysicalStalkinghttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionPhysical StalkingControl that monitors a Risk Vulnerability
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -18451,9 +12472,12 @@

    Prevent Exercising of Rights

    - + - + + + + @@ -18464,12 +12488,15 @@

    Prevent Exercising of Rights

    - + - + + + + - + @@ -18484,53 +12511,39 @@

    Prevent Exercising of Rights

    -
    -

    Privacy impact

    +
    +

    Operational Security Risk

    TermPreventExercisingOfRightsNonMaterialDamage Prefix risk
    LabelPrevent Exercising of RightsNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#PreventExercisingOfRightshttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrevent Exercising of RightsSomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-08-182022-03-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18539,29 +12552,20 @@

    Privacy impact

    - + - - - - + - - - - + - - - - + @@ -18575,55 +12579,40 @@

    Privacy impact

    -
    -

    Psychological Harm

    +
    +

    Payment

    TermPrivacyImpactOperationalSecurityRisk Prefix risk
    LabelPrivacy impactOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#PrivacyImpacthttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPrivacy impactRisks and issues that arise during operational processes
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18632,28 +12621,28 @@

    Psychological Harm

    - + - - - - + - + - + + + + - + @@ -18668,54 +12657,40 @@

    Psychological Harm

    -
    -

    Public Order Breach

    +
    +

    Personal Safety Endangerment

    TermPsychologicalHarmPayment Prefix risk
    LabelPsychological HarmPayment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPsychological HarmSomething that acts as or provides payment e.g. to access a service or purchase resources
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18724,7 +12699,7 @@

    Public Order Breach

    - + @@ -18742,7 +12717,10 @@

    Public Order Breach

    - + + + + @@ -18760,55 +12738,40 @@

    Public Order Breach

    -
    -

    Ransomware Attack

    +
    +

    Phishing Scam

    TermPublicOrderBreachPersonalSafetyEndangerment Prefix risk
    LabelPublic Order BreachPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionPublic Order BreachSomething that acts as or causes Personal Safety Endangerment
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -18817,7 +12780,7 @@

    Ransomware Attack

    - + @@ -18826,7 +12789,7 @@

    Ransomware Attack

    - + @@ -18835,7 +12798,10 @@

    Ransomware Attack

    - + + + + @@ -18853,47 +12819,39 @@

    Ransomware Attack

    -
    -

    Recovery Control

    +
    +

    Physical Assault

    TermRansomwareAttackPhishingScam Prefix risk
    LabelRansomware AttackPhishing Scam
    IRIhttps://w3id.org/dpv/risk#RansomwareAttackhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRansomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentialitySomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -18902,28 +12860,37 @@

    Recovery Control

    - + - + + + + - + - - + + + + + + + + - @@ -18932,58 +12899,46 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Physical Harm

    TermRecoveryControlPhysicalAssault Prefix risk
    LabelRecovery ControlPhysical Assault
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSomething that acts as or causes Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -18993,20 +12948,14 @@

    Reduce Likelihood

    - - - - + - - - - + - @@ -19015,58 +12964,46 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Privacy

    TermReduceLikelihoodPhysicalHarm Prefix risk
    LabelReduce LikelihoodPhysical Harm
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - - - - + @@ -19076,20 +13013,14 @@

    Reduce Severity

    - - - - + - - - - + - @@ -19098,47 +13029,39 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Psychological Harm

    TermReduceSeverityPrivacy Prefix risk
    LabelReduce SeverityPrivacy
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + @@ -19147,28 +13070,37 @@

    Reduction Control

    - + - + + + + - + - - + + + + + + + + - @@ -19177,55 +13109,40 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Public Order Breach

    TermReductionControlPsychologicalHarm Prefix risk
    LabelReduction ControlPsychological Harm
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or causes Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -19234,22 +13151,28 @@

    Re-identification

    - + - + + + + - + - + + + + @@ -19267,23 +13190,23 @@

    Re-identification

    -
    -

    Remedy Control

    +
    +

    Recovery Control

    TermReidentificationPublicOrderBreach Prefix risk
    LabelRe-identificationPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRe-identificationSomething that acts as or causes Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + @@ -19316,7 +13239,7 @@

    Remedy Control

    - + @@ -19346,53 +13269,46 @@

    Remedy Control

    -
    -

    Remote Spying

    +
    +

    Reduce Likelihood

    TermRemedyControlRecoveryControl Prefix risk
    LabelRemedy ControlRecovery Control
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RecoveryControl
    DefinitionControl to remedy consequences of eventControl to recover from event
    - + - + - + - + - - - - - + - @@ -19403,23 +13319,20 @@

    Remote Spying

    - + - - - - + - + @@ -19430,7 +13343,7 @@

    Remote Spying

    - @@ -19439,23 +13352,23 @@

    Remote Spying

    -
    -

    Remove Consequence

    +
    +

    Reduce Severity

    TermRemoteSpyingReduceLikelihood Prefix risk
    LabelRemote SpyingReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#RemoteSpyinghttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRemote SpyingControl that reduces the likelihood of an event
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -19467,7 +13380,7 @@

    Remove Consequence

    - - + @@ -19522,23 +13435,23 @@

    Remove Consequence

    -
    -

    Remove Impact

    +
    +

    Reduction Control

    TermRemoveConsequenceReduceSeverity Prefix risk
    LabelRemove ConsequenceReduce Severity
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#ReduceSeverity
    Broader/Parent types risk:ConsequenceControl + risk:ReductionControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -19489,7 +13402,7 @@

    Remove Consequence

    DefinitionControl that removes Consequence i.e. prevents it from materialisingControl that reduces the severity of an event
    - + - + - + @@ -19550,8 +13463,7 @@

    Remove Impact

    - @@ -19572,7 +13484,7 @@

    Remove Impact

    - + @@ -19586,12 +13498,9 @@

    Remove Impact

    - - - - - - + + + @@ -19605,48 +13514,42 @@

    Remove Impact

    -
    -

    Remove Source

    + + +
    +

    Re-identification

    TermRemoveImpactReductionControl Prefix risk
    LabelRemove ImpactReduction Control
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#ReductionControl
    Broader/Parent types risk:ImpactControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that removes Impact i.e. prevents it from materialisingControl that reduces the likelihood or severity of an event
    Date Created 2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -19655,9 +13558,12 @@

    Remove Source

    - + - + + + + @@ -19668,9 +13574,12 @@

    Remove Source

    - + - + + + + @@ -19679,7 +13588,7 @@

    Remove Source

    - @@ -19688,49 +13597,45 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Remedy Control

    TermRemoveSourceReidentification Prefix risk
    LabelRemove SourceRe-identification
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceSomething that acts as or causes Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2024-05-192022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - + - @@ -19741,7 +13646,7 @@

    Remuneration

    - + @@ -19754,18 +13659,15 @@

    Remuneration

    - + - - - - + - @@ -19774,52 +13676,46 @@

    Remuneration

    -
    -

    Replacement Costs

    +
    +

    Remove Consequence

    TermRenumerationRemedyControl Prefix risk
    LabelRemunerationRemedy Control
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRenumeration provided as compensation (as an impact)Control to remedy consequences of event
    Date Created2024-04-142024-05-19
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19830,23 +13726,20 @@

    Replacement Costs

    - + - - - - + - + @@ -19857,7 +13750,7 @@

    Replacement Costs

    - @@ -19866,51 +13759,46 @@

    Replacement Costs

    -
    -

    Reputation and trust impact

    +
    +

    Remove Impact

    TermReplacementCostsRemoveConsequence Prefix risk
    LabelReplacement CostsRemove Consequence
    IRIhttps://w3id.org/dpv/risk#ReplacementCostshttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReplacement CostsControl that removes Consequence i.e. prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -19921,23 +13809,20 @@

    Reputation and trust impact

    - + - - - - + - + @@ -19948,7 +13833,7 @@

    Reputation and trust impact

    - @@ -19957,52 +13842,46 @@

    Reputation and trust impact

    -
    -

    Retrieval of Deleted Data

    +
    +

    Remove Source

    TermReputationTrustImpactRemoveImpact Prefix risk
    LabelReputation and trust impactRemove Impact
    IRIhttps://w3id.org/dpv/risk#ReputationTrustImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Risk + risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionReputation and trust impactControl that removes Impact i.e. prevents it from materialising
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - @@ -20013,23 +13892,20 @@

    Retrieval of Deleted Data

    - + - - - - + - + @@ -20040,7 +13916,7 @@

    Retrieval of Deleted Data

    - @@ -20049,54 +13925,40 @@

    Retrieval of Deleted Data

    -
    -

    Retrieval of Discarded Equipment

    +
    +

    Remuneration

    TermRetrievalDeletedDataRemoveSource Prefix risk
    LabelRetrieval of Deleted DataRemove Source
    IRIhttps://w3id.org/dpv/risk#RetrievalDeletedDatahttps://w3id.org/dpv/risk#RemoveSource
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionRetrieval of Deleted DataControl that removes the risk source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -20105,28 +13967,28 @@

    Retrieval of Discarded Equipment

    - + - - - - + - + - + + + + - + @@ -20141,51 +14003,39 @@

    Retrieval of Discarded Equipment

    -
    -

    Reward

    +
    +

    Reputational Risk

    TermRetrievalDiscardedEquipmentRenumeration Prefix risk
    LabelRetrieval of Discarded EquipmentRemuneration
    IRIhttps://w3id.org/dpv/risk#RetrievalDiscardedEquipmenthttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:FinancialImpact + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionRetrieval of Discarded EquipmentSomething that acts as or provides renumeration which is in monetary or financial form
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -20194,7 +14044,7 @@

    Reward

    - + @@ -20205,15 +14055,9 @@

    Reward

    - - - - + - - - - + @@ -20224,42 +14068,39 @@

    Reward

    TermRewardReputationalRisk Prefix risk
    LabelRewardReputational Risk
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, dpv:Impactrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Benefit - → dpv:Impact - → dpv:Consequence + dpv:RiskConcept
    Subject of relation dpv:hasImpactOn -
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionReward provided as compensation (as an impact)Risks and issues that affect the reputation of the organisation
    Date Created2024-04-14
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - - - - -
    -

    Risk Analysis

    + +
    +

    Reward

    - + - + - + - + - @@ -20272,34 +14113,34 @@

    Risk Analysis

    - + - - - - + - + - + + + + - + - @@ -20307,35 +14148,37 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Prevent Exercising of Rights

    TermRiskAnalysisReward Prefix risk
    LabelRisk AnalysisReward
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:FinancialImpact + → dpv:RiskConcept
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    SourceIEC 31010:2019
    Date Created2022-08-182024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20348,31 +14191,37 @@

    Risk Assessment

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20380,44 +14229,49 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Impact to Rights

    TermRiskAssessmentRightsExercisePrevention Prefix risk
    LabelRisk AssessmentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionAssessment of risk involving its identification, analysis, and evaluationSomething that acts as or causes Prevent Exercising of Rights
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Source
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + - @@ -20428,31 +14282,40 @@

    Risk Control

    - + + + + + - - - - - + + + + - + - - + + + + + + + + - @@ -20460,33 +14323,38 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Limitation of Rights

    TermRiskControlRightsImpact Prefix risk
    LabelRisk ControlImpact to Rights
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
    DefinitionControl that modifies riskSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - + + + @@ -20498,31 +14366,37 @@

    Risk Management

    - + - + + + + - - - - + - + - - + + + + + + + + - @@ -20531,36 +14405,36 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Violation of Rights

    TermRiskManagementRightsLimitation Prefix risk
    LabelRisk ManagementLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskSomething that acts as or causes Limitation of Rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Source
    Date Created2024-06-122022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - @@ -20573,72 +14447,77 @@

    Risk Matrix

    - + - + + + + - - - - + - + - + + + + - + -
    TermRiskMatrixRightsViolation Prefix risk
    LabelRisk MatrixViolation of Rights
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Something that acts as or causes Violation of Rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    + + + + - -
    -

    Risk Matrix 3x3

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -20652,20 +14531,23 @@

    Risk Matrix 3x3

    - + - + + + + - + @@ -20676,7 +14558,7 @@

    Risk Matrix 3x3

    - @@ -20684,38 +14566,35 @@

    Risk Matrix 3x3

    - -
    -

    Risk Matrix 5x5

    +
    +

    Risk Assessment

    TermRiskMatrix3x3RiskAnalysis Prefix risk
    LabelRisk Matrix 3x3Risk Analysis
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-172022-08-18
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - @@ -20728,31 +14607,31 @@

    Risk Matrix 5x5

    - + - + + + + - + - - - - + - @@ -20760,42 +14639,46 @@

    Risk Matrix 5x5

    - -
    -

    Risk Matrix 7x7

    +
    +

    Risk Control

    TermRiskMatrix5x5RiskAssessment Prefix risk
    LabelRisk Matrix 5x5Risk Assessment
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -20804,10 +14687,13 @@

    Risk Matrix 7x7

    - + + + + @@ -20817,18 +14703,15 @@

    Risk Matrix 7x7

    - + - - - - + - @@ -20836,23 +14719,23 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    +
    +

    Risk Management

    TermRiskMatrix7x7RiskControl Prefix risk
    LabelRisk Matrix 7x7Risk Control
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in DEX
    - + - + - + @@ -20865,11 +14748,7 @@

    Risk Source

    - - - - + @@ -20878,20 +14757,23 @@

    Risk Source

    - + - + + + + - + @@ -20908,37 +14790,35 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Risk Matrix

    TermRiskSourceRiskManagement Prefix risk
    LabelRisk SourceRisk Management
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-02-142024-06-12
    - + - + - + - + - @@ -20952,20 +14832,23 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + - + @@ -20976,7 +14859,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - @@ -20985,23 +14868,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Risk Matrix 3x3

    TermRM3x3S1L1RiskMatrix Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Risk Matrix
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment + risk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2022-08-172024-02-14
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21013,8 +14896,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - @@ -21029,7 +14911,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - + @@ -21062,23 +14944,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Risk Matrix 5x5

    TermRM3x3S1L2RiskMatrix3x3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Risk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RiskMatrix3x3
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    - + - + - + @@ -21090,8 +14972,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - @@ -21106,7 +14987,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + @@ -21139,23 +15020,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Risk Matrix 7x7

    TermRM3x3S1L3RiskMatrix5x5 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Risk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RiskMatrix5x5
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    - + - + - + @@ -21167,8 +15048,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - @@ -21183,7 +15063,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - + @@ -21215,43 +15095,43 @@

    Low Risk (RM3x3 S:2 L:1)

    - -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Risk Source

    TermRM3x3S2L1RiskMatrix7x7 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Risk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RiskMatrix7x7
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix + risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    - + - + - + - + - - + + + + @@ -21260,7 +15140,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + @@ -21273,18 +15153,18 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + - - - - + + + + - @@ -21293,23 +15173,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRM3x3S2L2RiskSource Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Risk Source
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskMatrix3x3 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Date Modified2024-08-16
    See More: section RISK-MATRIX in RISK + section CORE in RISK
    - + - + - + @@ -21337,7 +15217,7 @@

    High Risk (RM3x3 S:2 L:3)

    - + @@ -21370,23 +15250,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRM3x3S2L3RM3x3S1L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Low Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM3x3S1L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21414,7 +15294,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - + @@ -21447,23 +15327,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRM3x3S3L1RM3x3S1L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM3x3S1L2
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -21491,7 +15371,7 @@

    High Risk (RM3x3 S:3 L:2)

    - + @@ -21524,23 +15404,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRM3x3S3L2RM3x3S1L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM3x3S1L3
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -21568,7 +15448,7 @@

    High Risk (RM3x3 S:3 L:3)

    - + @@ -21601,23 +15481,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRM3x3S3L3RM3x3S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM3x3S2L1
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -21629,7 +15509,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - - + @@ -21678,23 +15558,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRM5x5S1L1RM3x3S2L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Moderate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM3x3S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21645,7 +15525,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -21706,7 +15586,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - - + @@ -21755,23 +15635,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRM5x5S1L2RM3x3S2L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21722,7 +15602,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -21783,7 +15663,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - - + @@ -21832,23 +15712,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRM5x5S1L3RM3x3S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21799,7 +15679,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -21860,7 +15740,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - - + @@ -21909,23 +15789,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRM5x5S1L4RM3x3S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21876,7 +15756,7 @@

    Low Risk (RM5x5 S:1 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -21937,7 +15817,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - - + @@ -21986,23 +15866,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRM5x5S1L5RM3x3S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM3x3S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix3x3risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -21953,7 +15833,7 @@

    Low Risk (RM5x5 S:1 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22030,7 +15910,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -22063,23 +15943,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM5x5S2L1RM5x5S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S1L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22107,7 +15987,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -22140,23 +16020,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM5x5S2L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S1L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22184,7 +16064,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -22217,23 +16097,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM5x5S2L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S1L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22261,7 +16141,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -22294,23 +16174,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM5x5S2L4RM5x5S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S1L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22338,7 +16218,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -22371,23 +16251,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM5x5S2L5RM5x5S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S1L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -22415,7 +16295,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -22448,23 +16328,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM5x5S3L1RM5x5S2L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S2L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22492,7 +16372,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -22525,23 +16405,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM5x5S3L2RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S2L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -22569,7 +16449,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -22602,23 +16482,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM5x5S3L3RM5x5S2L3 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S2L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -22646,7 +16526,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -22679,23 +16559,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM5x5S3L4RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S2L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -22723,7 +16603,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -22756,23 +16636,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S3L5RM5x5S2L5 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -22800,7 +16680,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -22833,23 +16713,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S4L1RM5x5S3L1 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22877,7 +16757,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - + @@ -22910,23 +16790,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S4L2RM5x5S3L2 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22954,7 +16834,7 @@

    High Risk (RM5x5 S:4 L:3)

    - + @@ -22987,23 +16867,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S4L3RM5x5S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23031,7 +16911,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - + @@ -23064,23 +16944,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S4L4RM5x5S3L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23108,7 +16988,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - + @@ -23141,23 +17021,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S4L5RM5x5S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23185,7 +17065,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - + @@ -23218,23 +17098,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S5L1RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23262,7 +17142,7 @@

    High Risk (RM5x5 S:5 L:2)

    - + @@ -23295,23 +17175,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S5L2RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23339,7 +17219,7 @@

    High Risk (RM5x5 S:5 L:3)

    - + @@ -23372,23 +17252,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S5L3RM5x5S4L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23416,7 +17296,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - + @@ -23449,23 +17329,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S5L4RM5x5S4L4 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23493,7 +17373,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - + @@ -23526,23 +17406,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S5L5RM5x5S4L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23554,7 +17434,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - - + @@ -23603,23 +17483,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM7x7S1L1RM5x5S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23570,7 +17450,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23631,7 +17511,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - - + @@ -23680,23 +17560,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM7x7S1L2RM5x5S5L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23647,7 +17527,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -23708,7 +17588,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - - + @@ -23757,23 +17637,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM7x7S1L3RM5x5S5L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23724,7 +17604,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -23785,7 +17665,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - - + @@ -23834,23 +17714,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM7x7S1L4RM5x5S5L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23801,7 +17681,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -23862,7 +17742,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - - + @@ -23911,23 +17791,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM7x7S1L5RM5x5S5L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    Broader/Parent types risk:RiskMatrix7x7 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -23878,7 +17758,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23955,7 +17835,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -23988,23 +17868,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM7x7S1L6RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S1L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24032,7 +17912,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -24065,23 +17945,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM7x7S1L7RM7x7S1L2 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S1L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24109,7 +17989,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -24142,23 +18022,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM7x7S2L1RM7x7S1L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S1L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24186,7 +18066,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -24219,23 +18099,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM7x7S2L2RM7x7S1L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S1L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24263,7 +18143,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -24296,23 +18176,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM7x7S2L3RM7x7S1L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S1L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -24340,7 +18220,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -24373,23 +18253,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S2L4RM7x7S1L6 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S1L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24417,7 +18297,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -24450,23 +18330,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM7x7S2L5RM7x7S1L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S1L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -24494,7 +18374,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -24527,23 +18407,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM7x7S2L6RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S2L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24571,7 +18451,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -24604,23 +18484,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM7x7S2L7RM7x7S2L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S2L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24648,7 +18528,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -24681,23 +18561,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM7x7S3L1RM7x7S2L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S2L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -24725,7 +18605,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -24758,23 +18638,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S3L2RM7x7S2L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -24802,7 +18682,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -24835,23 +18715,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S3L3RM7x7S2L5 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -24879,7 +18759,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -24912,23 +18792,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S3L4RM7x7S2L6 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -24956,7 +18836,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -24989,23 +18869,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S3L5RM7x7S2L7 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25033,7 +18913,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -25066,23 +18946,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S3L6RM7x7S3L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25110,7 +18990,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -25143,23 +19023,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S3L7RM7x7S3L2 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25187,7 +19067,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -25220,23 +19100,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S4L1RM7x7S3L3 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25264,7 +19144,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -25297,23 +19177,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S4L2RM7x7S3L4 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25341,7 +19221,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -25374,23 +19254,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S4L3RM7x7S3L5 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25418,7 +19298,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -25451,23 +19331,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S4L4RM7x7S3L6 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -25495,7 +19375,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -25528,23 +19408,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S4L5RM7x7S3L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -25572,7 +19452,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -25605,23 +19485,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S4L6RM7x7S4L1 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25649,7 +19529,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -25682,23 +19562,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S4L7RM7x7S4L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -25726,7 +19606,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -25759,23 +19639,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S5L1RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -25803,7 +19683,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -25836,23 +19716,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S5L2RM7x7S4L4 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -25880,7 +19760,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -25913,23 +19793,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S5L3RM7x7S4L5 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25957,7 +19837,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -25990,23 +19870,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S5L4RM7x7S4L6 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26034,7 +19914,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -26067,23 +19947,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S5L5RM7x7S4L7 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26111,7 +19991,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -26144,23 +20024,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S5L6RM7x7S5L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26188,7 +20068,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -26221,23 +20101,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S5L7RM7x7S5L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26265,7 +20145,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -26298,23 +20178,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S6L1RM7x7S5L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26342,7 +20222,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -26375,23 +20255,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S6L2RM7x7S5L4 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26419,7 +20299,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -26452,23 +20332,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S6L3RM7x7S5L5 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -26496,7 +20376,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -26529,23 +20409,23 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S6L4RM7x7S5L6 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -26573,7 +20453,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -26606,23 +20486,23 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S6L5RM7x7S5L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -26650,7 +20530,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + @@ -26683,23 +20563,23 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S6L6RM7x7S6L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26727,7 +20607,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -26760,23 +20640,23 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S6L7RM7x7S6L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -26804,7 +20684,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - + @@ -26837,23 +20717,23 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S7L1RM7x7S6L3 Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -26881,7 +20761,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -26914,23 +20794,23 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S7L2RM7x7S6L4 Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -26958,7 +20838,7 @@

    High Risk (RM7x7 S:7 L:3)

    - + @@ -26991,23 +20871,23 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S7L3RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27035,7 +20915,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + @@ -27068,23 +20948,23 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S7L4RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27112,7 +20992,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -27145,23 +21025,23 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S7L5RM7x7S6L7 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27189,7 +21069,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -27222,23 +21102,23 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S7L6RM7x7S7L1 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27266,7 +21146,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -27299,55 +21179,42 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Sabotage

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S7L7RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + - + - - - - - - - - - + + @@ -27356,17 +21223,14 @@

    Sabotage

    - + - - - - + @@ -27383,7 +21247,7 @@

    Sabotage

    - @@ -27392,55 +21256,42 @@

    Sabotage

    -
    -

    Scam

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermSabotageRM7x7S7L3 Prefix risk
    LabelSabotageHigh Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#RM7x7S7L3
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSabotageNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27449,17 +21300,14 @@

    Scam

    - + - - - - + @@ -27476,7 +21324,7 @@

    Scam

    - @@ -27485,53 +21333,42 @@

    Scam

    -
    -

    Security Breach

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermScamRM7x7S7L4 Prefix risk
    LabelScamVery High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#RM7x7S7L4
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionScamNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27540,17 +21377,14 @@

    Security Breach

    - + - - - - + @@ -27567,7 +21401,7 @@

    Security Breach

    - @@ -27576,59 +21410,42 @@

    Security Breach

    - - - - - -
    -

    Service Interruption

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermSecurityBreachRM7x7S7L5 Prefix risk
    LabelSecurity BreachExtremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#RM7x7S7L5
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSecurity BreachNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27637,17 +21454,14 @@

    Service Interruption

    - + - - - - + @@ -27664,7 +21478,7 @@

    Service Interruption

    - @@ -27673,55 +21487,42 @@

    Service Interruption

    -
    -

    Sexual Violence

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermServiceInterruptionRM7x7S7L6 Prefix risk
    LabelService InterruptionExtremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#ServiceInterruptionhttps://w3id.org/dpv/risk#RM7x7S7L6
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionService InterruptionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27730,17 +21531,14 @@

    Sexual Violence

    - + - - - - + @@ -27757,7 +21555,7 @@

    Sexual Violence

    - @@ -27766,47 +21564,40 @@

    Sexual Violence

    -
    -

    Share Risk

    +
    +

    Sabotage

    TermSexualViolenceRM7x7S7L7 Prefix risk
    LabelSexual ViolenceExtremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#RM7x7S7L7
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSexual ViolenceNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    SourceENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -27815,22 +21606,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -27839,7 +21636,7 @@

    Share Risk

    - @@ -27848,53 +21645,40 @@

    Share Risk

    -
    -

    Social Disadvantage

    +
    +

    Scam

    TermShareRiskSabotage Prefix risk
    LabelShare RiskSabotage
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -27903,25 +21687,31 @@

    Social Disadvantage

    - + - + + + + - + - + + + + - + @@ -27936,47 +21726,40 @@

    Social Disadvantage

    -
    -

    Source Control

    +
    +

    Security Attack

    TermSocialDisadvantageScam Prefix risk
    LabelSocial DisadvantageScam
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSocial DisadvantageSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -27985,7 +21768,7 @@

    Source Control

    - + @@ -27996,20 +21779,14 @@

    Source Control

    - - - - + - - - - + - @@ -28018,55 +21795,40 @@

    Source Control

    -
    -

    Spam

    +
    +

    Security Breach

    TermSourceControlSecurityAttack Prefix risk
    LabelSource ControlSecurity Attack
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28075,7 +21837,7 @@

    Spam

    - + @@ -28084,7 +21846,7 @@

    Spam

    - + @@ -28093,7 +21855,10 @@

    Spam

    - + + + + @@ -28111,55 +21876,44 @@

    Spam

    -
    -

    Spoofing

    + + + + + +
    +

    Sexual Violence

    TermSpamSecurityBreach Prefix risk
    LabelSpamSecurity Breach
    IRIhttps://w3id.org/dpv/risk#Spamhttps://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpamSomething that acts as or causes Security Breach
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28168,7 +21922,7 @@

    Spoofing

    - + @@ -28177,7 +21931,7 @@

    Spoofing

    - + @@ -28186,7 +21940,10 @@

    Spoofing

    - + + + + @@ -28204,53 +21961,45 @@

    Spoofing

    -
    -

    Spying

    +
    +

    Share Risk

    TermSpoofingSexualViolence Prefix risk
    LabelSpoofingSexual Violence
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:IndividualRisk
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSpoofingSomething that acts as or causes Sexual Violence
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28261,23 +22010,20 @@

    Spying

    - + - - - - + - + @@ -28288,7 +22034,7 @@

    Spying

    - @@ -28297,55 +22043,40 @@

    Spying

    -
    -

    Stalking

    +
    +

    Social Disadvantage

    TermSpyingShareRisk Prefix risk
    LabelSpyingShare Risk
    IRIhttps://w3id.org/dpv/risk#Spyinghttps://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSpyingRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + + @@ -28354,28 +22085,28 @@

    Stalking

    - + - - - - + - + - + + + + - + @@ -28390,85 +22121,59 @@

    Stalking

    -
    -

    System Failure

    +
    +

    Societal Health & Safety

    TermStalkingSocialDisadvantage Prefix risk
    LabelStalkingSocial Disadvantage
    IRIhttps://w3id.org/dpv/risk#Stalkinghttps://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionStalkingSomething that acts as or causes Social Disadvantage
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    - + - + - + - + - - - - - - - - - + + - - - - + - - - - + - - - - + - - - - + @@ -28482,54 +22187,39 @@

    System Failure

    -
    -

    System Intrusion

    +
    +

    Societal Risk

    TermSystemFailureSocietalHealthSafety Prefix risk
    LabelSystem FailureSocietal Health & Safety
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem Failure
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28538,29 +22228,20 @@

    System Intrusion

    - + - - - - + - - - - + - - - - + @@ -28574,52 +22255,45 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Source Control

    TermSystemIntrusionSocietalRisk Prefix risk
    LabelSystem IntrusionSocietal Risk
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionSystem IntrusionRisks and issues that affect or have the potential to affect society at large or specific groups in society
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + - @@ -28630,23 +22304,20 @@

    System Malfunction

    - + - - - - + - + @@ -28657,7 +22328,7 @@

    System Malfunction

    - @@ -28666,55 +22337,44 @@

    System Malfunction

    -
    -

    Terrorism

    +
    +

    Spoofing

    TermSystemMalfunctionSourceControl Prefix risk
    LabelSystem MalfunctionSource Control
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionSystem MalfunctionRisk Mitigation Measure that controls the Source
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - - - - - + + @@ -28723,7 +22383,7 @@

    Terrorism

    - + @@ -28732,7 +22392,7 @@

    Terrorism

    - + @@ -28741,7 +22401,10 @@

    Terrorism

    - + + + + @@ -28759,55 +22422,40 @@

    Terrorism

    -
    -

    Theft

    +
    +

    System Failure

    TermTerrorismSpoofing Prefix risk
    LabelTerrorismSpoofing
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTerrorismSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018ISO/IEC 27005:2018, ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28816,16 +22464,19 @@

    Theft

    - + - + + + + - + @@ -28834,7 +22485,10 @@

    Theft

    - + + + + @@ -28852,55 +22506,40 @@

    Theft

    -
    -

    Theft of Equipment

    +
    +

    System Intrusion

    TermTheftSystemFailure Prefix risk
    LabelTheftSystem Failure
    IRIhttps://w3id.org/dpv/risk#Thefthttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheftSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -28909,7 +22548,7 @@

    Theft of Equipment

    - + @@ -28918,7 +22557,7 @@

    Theft of Equipment

    - + @@ -28927,7 +22566,10 @@

    Theft of Equipment

    - + + + + @@ -28945,55 +22587,40 @@

    Theft of Equipment

    -
    -

    Theft of Media

    +
    +

    System Malfunction

    TermTheftEquipmentSystemIntrusion Prefix risk
    LabelTheft of EquipmentSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#TheftEquipmenthttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of EquipmentSomething that acts as or causes System Intrusion
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29002,9 +22629,12 @@

    Theft of Media

    - + - + + + + @@ -29020,7 +22650,10 @@

    Theft of Media

    - + + + + @@ -29038,54 +22671,40 @@

    Theft of Media

    -
    -

    Third Party Operation Disruption

    +
    +

    Terrorism

    TermTheftMediaSystemMalfunction Prefix risk
    LabelTheft of MediaSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#TheftMediahttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:MaterialDamage - → risk:Damage - → dpv:Risk + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionTheft of MediaSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29094,7 +22713,7 @@

    Third Party Operation Disruption

    - + @@ -29112,7 +22731,10 @@

    Third Party Operation Disruption

    - + + + + @@ -29158,6 +22780,7 @@

    Threat

    @@ -29305,31 +22928,17 @@

    Unauthorised Access to Premises

    - + - - - - - - - - - + + @@ -29338,7 +22947,7 @@

    Unauthorised Access to Premises

    - + @@ -29356,7 +22965,10 @@

    Unauthorised Access to Premises

    - + + + + @@ -29374,54 +22986,40 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Code Access

    +
    +

    Unauthorised Activity

    TermThirdPartyOperationDisruptionTerrorism Prefix risk
    LabelThird Party Operation DisruptionTerrorism
    IRIhttps://w3id.org/dpv/risk#ThirdPartyOperationDisruptionhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:SocietalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionThird Party Operation DisruptionSomething that acts as or causes Terrorism
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Broader/Parent types risk:RiskSource + → dpv:RiskConcept
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Access to PremisesSomething that acts as or causes Unauthorised Access to Premises
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29430,29 +23028,20 @@

    Unauthorised Code Access

    - + - - - - + - - - - + - - - - + @@ -29466,54 +23055,40 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Unauthorised Code Access

    TermUnauthorisedCodeAccessUnauthorisedActivity Prefix risk
    LabelUnauthorised Code AccessUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code AccessSomething that acts as or causes Unauthorised Activity
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29522,7 +23097,7 @@

    Unauthorised Code Disclosure

    - + @@ -29540,7 +23115,10 @@

    Unauthorised Code Disclosure

    - + + + + @@ -29558,54 +23136,40 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Unauthorised Code Disclosure

    TermUnauthorisedCodeDisclosureUnauthorisedCodeAccess Prefix risk
    LabelUnauthorised Code DisclosureUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code DisclosureSomething that acts as or causes Unauthorised Code Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29614,7 +23178,7 @@

    Unauthorised Code Modification

    - + @@ -29632,7 +23196,10 @@

    Unauthorised Code Modification

    - + + + + @@ -29650,54 +23217,40 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Unauthorised Code Modification

    TermUnauthorisedCodeModificationUnauthorisedCodeDisclosure Prefix risk
    LabelUnauthorised Code ModificationUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Code ModificationSomething that acts as or causes Unauthorised Code Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29706,7 +23259,7 @@

    Unauthorised Data Access

    - + @@ -29715,7 +23268,7 @@

    Unauthorised Data Access

    - + @@ -29724,7 +23277,10 @@

    Unauthorised Data Access

    - + + + + @@ -29742,54 +23298,40 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Unauthorised Data Access

    TermUnauthorisedDataAccessUnauthorisedCodeModification Prefix risk
    LabelUnauthorised Data AccessUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data AccessSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29798,7 +23340,7 @@

    Unauthorised Data Disclosure

    - + @@ -29807,7 +23349,7 @@

    Unauthorised Data Disclosure

    - + @@ -29816,7 +23358,10 @@

    Unauthorised Data Disclosure

    - + + + + @@ -29834,55 +23379,40 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Unauthorised Data Disclosure

    TermUnauthorisedDataDisclosureUnauthorisedDataAccess Prefix risk
    LabelUnauthorised Data DisclosureUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data DisclosureSomething that acts as or causes Unauthorised Data Access
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29891,7 +23421,7 @@

    Unauthorised Data Modification

    - + @@ -29900,7 +23430,7 @@

    Unauthorised Data Modification

    - + @@ -29909,7 +23439,10 @@

    Unauthorised Data Modification

    - + + + + @@ -29927,55 +23460,40 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Impersonation

    +
    +

    Unauthorised Data Modification

    TermUnauthorisedDataModificationUnauthorisedDataDisclosure Prefix risk
    LabelUnauthorised Data ModificationUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Data ModificationSomething that acts as or causes Unauthorised Data Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -29984,7 +23502,7 @@

    Unauthorised Impersonation

    - + @@ -29993,7 +23511,7 @@

    Unauthorised Impersonation

    - + @@ -30002,7 +23520,10 @@

    Unauthorised Impersonation

    - + + + + @@ -30043,31 +23564,17 @@

    Unauthorised Information Disclosure

    - + - - - - - - - - - + + @@ -30076,7 +23583,7 @@

    Unauthorised Information Disclosure

    - + @@ -30094,7 +23601,10 @@

    Unauthorised Information Disclosure

    - + + + + @@ -30135,31 +23645,17 @@

    Unauthorised Re-Identification

    - + - - - - - - - - - + + @@ -30168,7 +23664,7 @@

    Unauthorised Re-Identification

    - + @@ -30183,7 +23679,10 @@

    Unauthorised Re-Identification

    - + + + + @@ -30224,31 +23723,17 @@

    Unauthorised Resource Use

    - + - - - - - - - - - + + @@ -30257,7 +23742,7 @@

    Unauthorised Resource Use

    - + @@ -30275,7 +23760,10 @@

    Unauthorised Resource Use

    - + + + + @@ -30316,31 +23804,17 @@

    Unauthorised System Access

    - + - - - - - - - - - + + @@ -30349,7 +23823,7 @@

    Unauthorised System Access

    - + @@ -30367,7 +23841,10 @@

    Unauthorised System Access

    - + + + + @@ -30408,31 +23885,17 @@

    Unauthorised System Modification

    - + - - - - - - - - - + + @@ -30441,7 +23904,7 @@

    Unauthorised System Modification

    - + @@ -30459,99 +23922,10 @@

    Unauthorised System Modification

    - - - - - - - - - - - - -
    TermUnauthorisedImpersonationUnauthorisedDataModification Prefix risk
    LabelUnauthorised ImpersonationUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#UnauthorisedImpersonationhttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:NonMaterialDamage - → risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised ImpersonationSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Information DisclosureSomething that acts as or causes Unauthorised Information Disclosure
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Reidentification - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Re-IdentificationSomething that acts as or causes Unauthorised Re-Identification
    Date Created 2022-08-19
    Date Modified2024-08-16
    Contributors Georg P. Krog
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised Resource UseSomething that acts as or causes Unauthorised Resource Use
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System AccessSomething that acts as or causes Unauthorised System Access
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnauthorised System ModificationSomething that acts as or causes Unauthorised System Modification
    Date Created 2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    - - - -
    -

    Unknown Vulnerability Exploited

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + - - - - - - - - @@ -30592,31 +23966,17 @@

    Unwanted Code Deletion

    - + - - - - - - - - - + + @@ -30625,7 +23985,7 @@

    Unwanted Code Deletion

    - + @@ -30643,7 +24003,10 @@

    Unwanted Code Deletion

    - + + + + @@ -30684,31 +24047,17 @@

    Unwanted Data Deletion

    - + - - - - - - - - - - - + + + + + @@ -30717,7 +24066,7 @@

    Unwanted Data Deletion

    - + @@ -30735,7 +24084,10 @@

    Unwanted Data Deletion

    - + + + + @@ -30776,31 +24128,17 @@

    Unwanted Disclosure of Data

    - + - - - - - - - - - + + @@ -30809,7 +24147,7 @@

    Unwanted Disclosure of Data

    - + @@ -30827,7 +24165,10 @@

    Unwanted Disclosure of Data

    - + + + + @@ -30845,54 +24186,39 @@

    Unwanted Disclosure of Data

    -
    -

    Vandalism

    +
    +

    User Risks

    TermUnknownVulnerabilityExploitedPrefixrisk
    LabelUnknown Vulnerability Exploited
    IRIhttps://w3id.org/dpv/risk#UnknownVulnerabilityExploited
    Typerdfs:Class, skos:Concept, dpv:Risk
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnknown Vulnerability Exploited
    SourceENISA Reference Incident Classification Taxonomy 2018Date Modified2024-08-16
    Date Created2022-08-17
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Code DeletionSomething that acts as or causes Unwanted Code Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionUnwanted Data DeletionSomething that acts as or causes Unwanted Data Deletion
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionUnwanted Disclosure of DataSomething that acts as or causes Unwanted Disclosure of Data
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -30901,29 +24227,20 @@

    Vandalism

    - + - - - - + - - - - + - - - - + @@ -31453,54 +24770,40 @@

    Very Low Severity

    -
    -

    Violation of Code of Conduct

    +
    +

    Violating Code of Conduct

    TermVandalismUserRisks Prefix risk
    LabelVandalismUser Risks
    IRIhttps://w3id.org/dpv/risk#Vandalismhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVandalismConcepts associated with risks that arise due to User or Human use
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31509,9 +24812,12 @@

    Violation of Code of Conduct

    - + - + + + + @@ -31527,7 +24833,10 @@

    Violation of Code of Conduct

    - + + + + @@ -31545,54 +24854,40 @@

    Violation of Code of Conduct

    -
    -

    Violation of Contractual Obligations

    +
    +

    Violation of Contractual Obligation

    TermViolationCodeConductViolatingCodeOfConduct Prefix risk
    LabelViolation of Code of ConductViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#ViolationCodeConducthttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Code of ConductSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31601,9 +24896,12 @@

    Violation of Contractual Obligations

    - + - + + + + @@ -31619,7 +24917,10 @@

    Violation of Contractual Obligations

    - + + + + @@ -31637,54 +24938,40 @@

    Violation of Contractual Obligations

    -
    -

    Violation of Ethical Code

    +
    +

    Violating Ethics Code

    TermViolationContractualObligationsViolatingContractualObligation Prefix risk
    LabelViolation of Contractual ObligationsViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#ViolationContractualObligationshttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Contractual ObligationsSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31693,9 +24980,12 @@

    Violation of Ethical Code

    - + - + + + + @@ -31711,7 +25001,10 @@

    Violation of Ethical Code

    - + + + + @@ -31729,55 +25022,40 @@

    Violation of Ethical Code

    -
    -

    Violation of Rights

    +
    +

    Violation of Legal Obligations

    TermViolationEthicalCodeViolatingEthicsCode Prefix risk
    LabelViolation of Ethical CodeViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#ViolationEthicalCodehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Ethical CodeSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31786,25 +25064,34 @@

    Violation of Rights

    - + - + + + + - + + + + - + - + + + + - + @@ -31819,54 +25106,40 @@

    Violation of Rights

    -
    -

    Violation of Regulatory Obligations

    +
    +

    Violating Policy

    TermViolationOfRightsViolatingLegalObligation Prefix risk
    LabelViolation of RightsViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ViolationOfRightshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Harm - → risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of RightsSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + + @@ -31875,29 +25148,20 @@

    Violation of Regulatory Obligations

    - + - - - - + - - - - + - - - - + @@ -31911,13 +25175,13 @@

    Violation of Regulatory Obligations

    -
    +

    Violation of Statutory Obligations

    TermViolationRegulatoryObligationsViolatingPolicy Prefix risk
    LabelViolation of Regulatory ObligationsViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolationRegulatoryObligationshttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Regulatory ObligationsSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    - + @@ -31927,38 +25191,24 @@

    Violation of Statutory Obligations

    - + - + - - - - - - - - - + + @@ -31967,9 +25217,12 @@

    Violation of Statutory Obligations

    - + - + + + + @@ -31985,7 +25238,10 @@

    Violation of Statutory Obligations

    - + + + + @@ -32002,47 +25258,40 @@

    Violation of Statutory Obligations

    -
    -

    Vulnerability

    + +
    +

    Violence against children

    TermViolationStatutoryObligationsViolatingStatutoryObligations Prefix risk
    IRIhttps://w3id.org/dpv/risk#ViolationStatutoryObligationshttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Damage - → dpv:Risk + risk:LegalRisk + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionViolation of Statutory ObligationsSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    - + - + - + - + + + + - - - - - - - - - + + @@ -32051,28 +25300,40 @@

    Vulnerability

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -32080,53 +25341,45 @@

    Vulnerability

    - -
    -

    Vulnerability Created

    +
    +

    Vulnerability

    TermVulnerabilityViolenceAgainstChildren Prefix risk
    LabelVulnerabilityViolence against children
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk +
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONSEQUENCES in RISK
    - + - + - + - + - - - + - - @@ -32137,34 +25390,28 @@

    Vulnerability Created

    - + - - - - - + + - + - - - - + - @@ -32173,54 +25420,40 @@

    Vulnerability Created

    -
    -

    Vulnerability Exploited

    +
    +

    Vulnerability Created

    TermVulnerabilityCreatedVulnerability Prefix risk
    LabelVulnerability CreatedVulnerability
    IRIhttps://w3id.org/dpv/risk#VulnerabilityCreatedhttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept
    Broader/Parent types risk:Detriment - → dpv:Risk -
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource + risk:isExploitedBy, + risk:isVulnerabilityOf
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk + risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability
    DefinitionVulnerability CreatedIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - + + @@ -32229,7 +25462,7 @@

    Vulnerability Exploited

    - + @@ -32238,7 +25471,7 @@

    Vulnerability Exploited

    - + @@ -32247,7 +25480,10 @@

    Vulnerability Exploited

    - + + + + @@ -32378,84 +25614,6 @@

    Properties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32653,18 +25811,6 @@

    caused by vulnerability

    - - - - - - - - - - - - @@ -32693,54 +25839,6 @@

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -32871,15 +25969,6 @@

    exploits vulnerability

    - - - - - - - - - @@ -33275,6 +26364,8 @@

    has vulnerability

    + + @@ -33287,15 +26378,6 @@

    has vulnerability

    - - - - - - - - - @@ -33487,72 +26569,21 @@

    is vulnerability of

    - - - - - - - - - - - - -
    TermVulnerabilityExploitedVulnerabilityCreated Prefix risk
    LabelVulnerability ExploitedVulnerability Created
    IRIhttps://w3id.org/dpv/risk#VulnerabilityExploitedhttps://w3id.org/dpv/risk#VulnerabilityCreated
    Typerdfs:Class, skos:Concept, dpv:Riskrdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:Detriment - → dpv:Risk + risk:InternalSecurityThreat + → dpv:RiskConcept
    Subject of relation dpv:hasResidualRisk, - dpv:hasRiskLevel, - dpv:isMitigatedByMeasure, - risk:hasRiskSource -
    Object of relation dpv:hasRisk, - dpv:isResidualRiskOf, - dpv:mitigatesRisk, - risk:refersToRisk -
    DefinitionVulnerability ExploitedSomething that acts as or causes Vulnerability Created
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + Date Created + 2024-02-14 + + + + + + + See More: + section CORE in RISK + + + + +
    @@ -34194,24 +27225,6 @@

    refers to risk

    - - - - - - - - - - - - - - - - - - @@ -34323,81 +27336,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34423,17 +27361,9 @@

    External

    - - - - - - - - @@ -34445,7 +27375,6 @@

    External

    - @@ -34454,17 +27383,14 @@

    External

    - - - @@ -34491,12 +27417,9 @@

    External

    - - - @@ -34510,59 +27433,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34577,10 +27447,6 @@

    External

    - - - - @@ -34589,11 +27455,6 @@

    External

    - - - - - @@ -34617,7 +27478,6 @@

    External

    - @@ -34659,26 +27519,20 @@

    External

    - - - - - - @@ -34767,46 +27621,6 @@

    External

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -34815,10 +27629,6 @@

    External

    - - - - @@ -34830,10 +27640,8 @@

    External

    - - @@ -35280,28 +28088,13 @@

    External

    - - - - - - - - - - - - - - - @@ -35430,9 +28223,6 @@

    External

    - - - diff --git a/2.1-dev/risk/risk.jsonld b/2.1-dev/risk/risk.jsonld index d808d6a86..311a67a9c 100644 --- a/2.1-dev/risk/risk.jsonld +++ b/2.1-dev/risk/risk.jsonld @@ -1,10 +1,10 @@ [ { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14,12 +14,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -35,42 +35,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -80,7 +71,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -96,33 +98,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -132,12 +150,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -153,33 +171,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityDispute", + "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -189,7 +219,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-24" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -205,24 +235,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Dispute" + "@value": "Monitor Risk Source" } ] }, @@ -288,11 +318,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DetrimentToRecovery", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -302,12 +332,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne6d29cc562794702b681b9554016eecb" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -323,116 +348,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Detriment to Recovery" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment to Recovery" - } - ] - }, - { - "@id": "_:Ne6d29cc562794702b681b9554016eecb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossControlOverData", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Control over Data" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Control over Data" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50" + "@id": "_:N540e39aa17014568ba5a2b03534c1f19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -448,13 +411,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -465,32 +428,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N819ddb3a0c7641f1af28c8299c1c7e50", + "@id": "_:N540e39aa17014568ba5a2b03534c1f19", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -500,7 +463,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -516,43 +484,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -560,6 +522,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -568,33 +535,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact(s) that acts as or causes benefits" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossOpportunity", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -607,9 +574,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577" + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -620,18 +593,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Opportunity" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -642,12 +615,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Opportunity" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N59a3652d6d55465d9e75cc1f81f24577", + "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", "@type": [ "https://schema.org/WebPage" ], @@ -663,48 +642,85 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PersonnelAbsence", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/examples" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -715,33 +731,44 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personnel Absence" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N2a23fa55d2e04a67ad5e2e24d4bcbcde", + "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -761,13 +788,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -778,21 +805,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -808,48 +840,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#RecoveryControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -865,78 +887,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.ttl" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "_:Na66b6d002d3f448981a58870da1a686e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -950,40 +948,51 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" + "@value": "Personal Safety Endangerment" } + ] + }, + { + "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -996,9 +1005,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.06,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1014,33 +1029,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Injury" + } + ] + }, + { + "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactToRights", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1053,9 +1084,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1071,49 +1102,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ] - }, - { - "@id": "_:N5b98ac2b7132459383ce9e416c580aab", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1126,9 +1141,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115" + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1144,13 +1165,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Environmental Safety Endangerment" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1161,32 +1182,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Safety Endangerment" + "@value": "Human Errors" } ] }, { - "@id": "_:Necbf3b00fe7c4378a22277a2715fc115", + "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossReputation", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1199,9 +1220,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na656b20429c445f88a1845779a6748c4" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1217,49 +1238,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Reputation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Reputation" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "_:Na656b20429c445f88a1845779a6748c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1272,9 +1277,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1290,33 +1301,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1326,7 +1353,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1342,29 +1374,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1383,7 +1415,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1399,13 +1431,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1416,32 +1448,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1456,13 +1472,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1473,52 +1489,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" - } - ] - }, - { - "@id": "_:N4c356797c7c74ddcb5b3e2fbf5492955", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.5,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1529,55 +1523,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1591,31 +1572,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1634,7 +1615,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1654,12 +1635,15 @@ }, { "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1670,18 +1654,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#incident-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1700,7 +1690,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.36,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1716,13 +1706,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1733,16 +1723,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AbusiveContentUtilisation", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1755,9 +1745,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd" + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1773,13 +1769,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Abusive Content Utilisation" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1790,12 +1786,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Abusive Content Utilisation" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Na53aca92ff504700b24fddf086fdbcbd", + "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", "@type": [ "https://schema.org/WebPage" ], @@ -1811,11 +1813,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#HarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1828,9 +1830,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1846,51 +1848,71 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harmful Speech" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harmful Speech" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "_:Nd8ba79da04f644d381cffbd90c061940", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-05-19" @@ -1909,13 +1931,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1926,16 +1948,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossSuppliers", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1948,9 +1970,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc" + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1961,18 +1989,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Suppliers" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1983,12 +2011,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Suppliers" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nc650999cea7542a4a3a6d37ccc8f8bfc", + "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", "@type": [ "https://schema.org/WebPage" ], @@ -2004,11 +2038,16 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedImpersonation", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -2018,17 +2057,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2039,64 +2078,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Impersonation" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Impersonation" - } - ] - }, - { - "@id": "_:N5ce4b3b66b114479a698ad8b3be82dc4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2112,57 +2125,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na7ae462a47ff4a078544c1576af327df" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2178,64 +2172,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Detection Control" } ] }, { - "@id": "_:Na7ae462a47ff4a078544c1576af327df", + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#hasThreatSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2249,67 +2232,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "has threat source" } - ] - }, - { - "@id": "_:N3ef3d61086c7449c9fa8da3a3e18a5a4", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.43,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2324,37 +2280,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2362,11 +2355,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2375,24 +2363,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Risk Matrix 3x3" } ] }, @@ -2448,11 +2436,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2465,9 +2453,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2483,59 +2471,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "_:N82ffb9d2a1b84adc82827c61420f90db", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskManagement", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2543,57 +2526,57 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "System Intrusion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoteSpying", + "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:N76f8e9999d454353951813283e46b250" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2608,13 +2591,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Remote Spying" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2625,32 +2608,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remote Spying" + "@value": "Environmental Risk" } ] }, { - "@id": "_:N76f8e9999d454353951813283e46b250", + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2663,9 +2636,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.37,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2681,33 +2660,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#BusinessPerformanceImpairment", + "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2720,9 +2715,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N42235d0a675a4bf393d379a4650a468b" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2738,59 +2733,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business Performance Impairment" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business Performance Impairment" - } - ] - }, - { - "@id": "_:N42235d0a675a4bf393d379a4650a468b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2798,6 +2771,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2806,33 +2784,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#CitizensImpact", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2845,9 +2823,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2863,49 +2841,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Citizens impact" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Citizens impact" - } - ] - }, - { - "@id": "_:N5b4ae5ea8c4747bda256be7aae5f9c68", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2918,9 +2880,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N787d49d55a21419a871a50a966b25089" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2936,49 +2898,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Injury" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:N787d49d55a21419a871a50a966b25089", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossTechnologicalAdvantage", + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2988,12 +2934,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3009,13 +2956,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Technological Advantage" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3026,28 +2973,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Technological Advantage" - } - ] - }, - { - "@id": "_:Ndb310d26ace14cfb98c845566e76baac", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Harm" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3066,7 +3003,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3082,13 +3019,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3099,16 +3036,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#TheftMedia", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3121,9 +3058,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3139,64 +3076,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Media" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "_:N359e4248fdaf4b46b6cdfab4ccf4a8c0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostOperationInterruption", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3204,6 +3120,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskManagement" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3212,64 +3133,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Operation Interruption" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Operation Interruption" - } - ] - }, - { - "@id": "_:Nfc2b6762d79f4920a619ee82a609238f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#hasVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3283,35 +3182,35 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -3321,12 +3220,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3342,64 +3236,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N37410d4f163c49f082b8bbe5295e0ee1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3415,54 +3294,60 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@id": "_:Nd8a232e440f041b496b97da8007b588a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3470,56 +3355,57 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" - }, - { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", + "@id": "_:Nd8a232e440f041b496b97da8007b588a", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#BusinessImpact", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3532,9 +3418,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9088c785a56f4f7fa048660465c7540e" + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3550,13 +3442,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business impact" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3567,48 +3459,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business impact" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:N9088c785a56f4f7fa048660465c7540e", + "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#ComponentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3623,13 +3499,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3640,32 +3516,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N3f570391faa94e1b95f8eb082a7075cf", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Component Failure" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -3675,7 +3541,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3691,48 +3557,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#ThirdPartyOperationDisruption", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N213543eccf8b457d9b7afa4825722eef" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3740,6 +3601,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3748,60 +3614,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Third Party Operation Disruption" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Third Party Operation Disruption" - } - ] - }, - { - "@id": "_:N213543eccf8b457d9b7afa4825722eef", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3816,43 +3655,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceOnDataSecurity", + "@id": "https://w3id.org/dpv/risk#ContainmentControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3868,33 +3702,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence on Data Security" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3907,9 +3741,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3925,45 +3759,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" - } - ] - }, - { - "@id": "_:N4542f58a06af463b8cd2615f46f20a58", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3982,7 +3800,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3998,13 +3816,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4015,16 +3833,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CyberSpying", + "@id": "https://w3id.org/dpv/risk#LowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -4034,12 +3852,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4055,49 +3873,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cyber Spying" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cyber Spying" - } - ] - }, - { - "@id": "_:N31ecfcad6e6c4841abd4b780add44b8f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Low Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4110,9 +3924,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b" + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4128,13 +3948,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "System Failure" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4145,32 +3965,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Sabotage" } ] }, { - "@id": "_:Nfe1a236b523048f895fcff6caccafd8b", + "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#CorruptionData", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4183,9 +4003,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae" + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4201,49 +4021,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Corruption of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Corruption of Data" - } - ] - }, - { - "@id": "_:Ndbcb5e29af144df292f86dbd1199a2ae", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#IncidentTerminated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -4253,12 +4057,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4274,49 +4073,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" - } - ] - }, - { - "@id": "_:Nc3c32b90acb84b7383d55bd093f8444c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4329,9 +4112,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.40,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7beef942706b41468112e467b91c5f39" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4347,44 +4136,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Malicious Code Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#PreventExercisingOfRights", + "@id": "_:N7beef942706b41468112e467b91c5f39", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4399,13 +4193,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4416,22 +4210,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4441,7 +4229,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4457,49 +4250,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HealthLifeImpact", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4514,13 +4291,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Health and life impact" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4531,28 +4302,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Health and life impact" - } - ] - }, - { - "@id": "_:N4dfdbc74b63b498d8ebada378681e3c5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4571,7 +4326,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4593,7 +4348,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4604,16 +4359,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -4623,12 +4378,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4644,33 +4394,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -4680,12 +4430,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4701,33 +4451,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ServiceInterruption", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4740,9 +4502,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4758,49 +4520,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Service Interruption" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Service Interruption" - } - ] - }, - { - "@id": "_:Nb34008105a6f4e9491a3fc1c6d64ae5a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Stalking", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4813,9 +4559,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4831,64 +4577,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Stalking" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Stalking" - } - ] - }, - { - "@id": "_:Na0293a79dac14e75a97ab4e81d5b4d01", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.31,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4899,54 +4636,38 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4961,45 +4682,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5012,9 +4721,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce" + "@id": "_:N73922ea12cd34584b91e209f306167ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5030,13 +4745,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5047,32 +4762,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Ne39ab0f5f3bc4dad9d7425708acc01ce", + "@id": "_:N73922ea12cd34584b91e209f306167ae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5085,9 +4800,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5103,33 +4824,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Compromise Account" + } + ] + }, + { + "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndustrialCrisis", + "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5142,12 +4879,18 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:Na943aaebcd6b4587862424ae0d880839" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -5160,13 +4903,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Something that acts as or causes Vulnerability Created" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5177,12 +4920,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Industrial Crisis" + "@value": "Vulnerability Created" } ] }, { - "@id": "_:Na943aaebcd6b4587862424ae0d880839", + "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", "@type": [ "https://schema.org/WebPage" ], @@ -5198,31 +4941,25 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N625ea761ef2c46e49325339e76de3953" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5233,49 +4970,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" - } - ] - }, - { - "@id": "_:N625ea761ef2c46e49325339e76de3953", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5285,7 +5006,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5301,33 +5027,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -5337,12 +5063,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5358,32 +5079,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { @@ -5396,11 +5123,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5409,33 +5131,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5448,9 +5170,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5466,49 +5188,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ] - }, - { - "@id": "_:N2abe61b7583f4b63bf151dd2f3f46790", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -5518,12 +5224,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5539,33 +5240,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5578,9 +5279,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5596,49 +5297,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:N35f29ada90f44ea7b593d02e71f8efb5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MisinformationDisinformation", + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5651,11 +5336,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5669,49 +5349,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misinformation and Disinformation" - } - ] - }, - { - "@id": "_:N6f188b9124c248ee8cd9cf07f519eb0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk#Eavesdropping", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5724,9 +5388,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5742,49 +5406,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Eavesdropping" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Eavesdropping" - } - ] - }, - { - "@id": "_:Nbf3e2ced31884dc79e53abca0a8fd118", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Theft", + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -5794,12 +5442,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0987f80167844b359aae438673b4fe3b" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5815,63 +5458,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft" + "@value": "5 Risk Levels" } ] }, { - "@id": "_:N0987f80167844b359aae438673b4fe3b", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.61,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5882,33 +5515,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RansomwareAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5921,12 +5554,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N5e35e90757324413800afec9a109dbc4" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5942,65 +5572,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ransomware Attack" - } - ] - }, - { - "@id": "_:Nf599f11d9fce44da997dd770c88605a3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "_:N5e35e90757324413800afec9a109dbc4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAssessment" ], "http://purl.org/dc/terms/contributor": [ { @@ -6010,12 +5608,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.01,xsd:decimal" + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6031,39 +5629,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" + "@value": "Risk Matrix" } + ] + }, + { + "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6076,9 +5684,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2" + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6094,13 +5708,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6111,12 +5725,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:Ne738bfddb0b14670b04bb31747d299f2", + "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", "@type": [ "https://schema.org/WebPage" ], @@ -6132,16 +5746,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DetectionControl", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N61513676426149faae9e58063eb667d8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6157,64 +5787,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Coercion" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "_:N61513676426149faae9e58063eb667d8", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#InternalOperationDisruption", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6227,9 +5842,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6245,49 +5860,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Internal Operation Disruption" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Operation Disruption" - } - ] - }, - { - "@id": "_:N39de821e0e25459bac3772a64d74d7b2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossResources", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6300,9 +5899,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6f190351ee794fc7bea72163952a80c9" + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6318,13 +5923,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Resources" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6335,41 +5940,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Resources" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N6f190351ee794fc7bea72163952a80c9", + "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6383,35 +6001,41 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "Violation of Rights" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -6421,7 +6045,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6437,33 +6066,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossFunds", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6476,9 +6117,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N853be36f6ea645d181836e5c35b74b46" + "@id": "_:N4387faf4bb854435bfdc47ebf666782a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6494,13 +6141,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Funds" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6511,12 +6158,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Funds" + "@value": "Unauthorised System Access" } ] }, { - "@id": "_:N853be36f6ea645d181836e5c35b74b46", + "@id": "_:N4387faf4bb854435bfdc47ebf666782a", "@type": [ "https://schema.org/WebPage" ], @@ -6532,11 +6179,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#MonitorRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -6546,12 +6193,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6567,33 +6209,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6606,9 +6248,18 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" + }, + { + "@id": "_:N698cebdfba864777b23d25052c4d2493" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6624,102 +6275,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spam", + "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Spam" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Spam" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "_:Ned3bf321a3a14924bc139490d0651e74", + "@id": "_:N698cebdfba864777b23d25052c4d2493", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6749,13 +6362,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6766,16 +6379,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -6785,12 +6398,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6806,48 +6414,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6855,6 +6483,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6863,49 +6496,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Availability Incident" } ] }, { - "@id": "_:Nbf2a2c4330ef4ecdaddf5be584c3f20c", + "@id": "https://w3id.org/dpv/risk#LegalRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their basis in legal requirements and enforcement" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -6920,7 +6578,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6936,19 +6594,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6959,37 +6617,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#isExploitedBy", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7003,51 +6660,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "is exploited by" } - ] - }, - { - "@id": "_:N3a904e86c7494afc8e4b600ca65a38a3", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7057,7 +6703,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf877665a169e4a7eac29964fc15db245" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7073,29 +6730,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7114,7 +6787,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7130,13 +6803,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7147,26 +6820,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LimitationOfRights", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7182,33 +6860,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#KnownVulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -7218,12 +6896,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N929457e20b914d3ca2b32435a60cb142" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7239,59 +6917,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Known Vulnerability Exploited" + "@value": "Very High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "_:N929457e20b914d3ca2b32435a60cb142", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7299,11 +6981,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskManagement" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7312,29 +6989,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", + "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7353,7 +7052,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.44,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7369,13 +7068,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7386,68 +7085,76 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Monitor Risk Source" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7457,12 +7164,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7478,61 +7185,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "DGA 2.10" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -7545,13 +7248,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Fee provided as compensation (as an impact)" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7562,16 +7265,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -7581,12 +7300,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7602,47 +7316,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7656,40 +7371,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7699,12 +7409,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N903ec696d7504183af4ba63f3f295e8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7720,57 +7436,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Psychological Harm" } + ] + }, + { + "@id": "_:N903ec696d7504183af4ba63f3f295e8e", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N471809172d6943bf838438296ceb4144" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7784,61 +7506,44 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "exploits vulnerability" } - ] - }, - { - "@id": "_:N471809172d6943bf838438296ceb4144", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7846,6 +7551,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7854,33 +7564,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes material damages" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7893,9 +7603,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7911,49 +7621,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Exploited" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "_:N0a110c0ba6a84ab5bff7a43872fc269f", + "@id": "https://w3id.org/dpv/risk#IndividualRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -7963,12 +7692,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N314876c286064f38bbd79769edaa4106" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7984,53 +7713,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "_:N314876c286064f38bbd79769edaa4106", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8038,11 +7768,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8051,173 +7776,245 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@value": "Risk Concepts - N3 serialiation" + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Julio Fernandez" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "2022-08-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/creator": [ { + "@language": "en", "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/description": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "2024-07-13" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Risk Concepts" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/ontology/bibo/doi": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "10.5281/zenodo.12505841" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/ontology/bibo/status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@value": "0.31,xsd:decimal" + "@value": "risk" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "accepted" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "2.1-dev" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8230,9 +8027,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8243,3570 +8046,60 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolationCodeConduct", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Code of Conduct" - } - ] - }, - { - "@id": "_:N08f98cfb490e4377968d0bdceef6d752", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IllegalProcessingData", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Illegal Processing of Data" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Illegal Processing of Data" - } - ] - }, - { - "@id": "_:Nd065d107f9b346118bd3ef40343a6578", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Vandalism", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N876c898e81374a399d04313b0a0abd5c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Vandalism" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Vandalism" - } - ] - }, - { - "@id": "_:N876c898e81374a399d04313b0a0abd5c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.14,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DangertoCustomers", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N18831f0e8999465a8606d764cedbf772" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Danger to Customers" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Danger to Customers" - } - ] - }, - { - "@id": "_:N18831f0e8999465a8606d764cedbf772", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N834144a719d041d4970f5c070cc5f001" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Authorisation Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:N834144a719d041d4970f5c070cc5f001", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#FinancialRepairCosts", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Financial Repair Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Repair Costs" - } - ] - }, - { - "@id": "_:N7f533a28104e4800b2f3214a1e2a521a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LossCustomers", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Customers" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Customers" - } - ] - }, - { - "@id": "_:N2d9bd509e2a24a7bb40afec96fed995a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ComplianceImpact", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compliance impact" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Compliance impact" - } - ] - }, - { - "@id": "_:Nb870529fa4aa4e9fbe6ba0f0b7201bc9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Environmental Incident" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LowSeverity", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Severity is Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unwanted Data Deletion" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Data Deletion" - } - ] - }, - { - "@id": "_:N3c1a8ffc58614efdb0d2f7a73d2a65ad", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#ImpactAssessment" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#ImpactAssessment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "An impact assessment associated with a incident" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Impact Assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Risk is Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Register" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Accidental Incident" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolationContractualObligations", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N615266688f80421fb6568a1b19a929d0" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Contractual Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Contractual Obligations" - } - ] - }, - { - "@id": "_:N615266688f80421fb6568a1b19a929d0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "5 Severity Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.49,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.18,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Detriment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Impact that acts as or causes detriments" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Detriment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SexualViolence", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb24249010a4a495187a77d855cd41e79" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Sexual Violence" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:Nb24249010a4a495187a77d855cd41e79", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LossGoods", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N26efb77318794637980a0cf151019d5e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Loss of Goods" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Loss of Goods" - } - ] - }, - { - "@id": "_:N26efb77318794637980a0cf151019d5e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.22,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Halted" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Concluded" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.49,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolationEthicalCode", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Violation of Ethical Code" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Ethical Code" - } - ] - }, - { - "@id": "_:Nb7163092258b4561a74cfd6b3100c16c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhishingScam", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A type of social engineering attack involving deceptive messages intended to reveal sensitive information" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Phishing Scam" - } - ] - }, - { - "@id": "_:N7f9f673ca380433eb008c29d3da8e2dc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N30752965a65a41159a1711755717d53a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N30752965a65a41159a1711755717d53a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ChildViolence", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Child Violence" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Child Violence" - } - ] - }, - { - "@id": "_:N3bd2448164954219a01c985e6eb8e3ea", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RetrievalDiscardedEquipment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Retrieval of Discarded Equipment" - } - ] - }, - { - "@id": "_:N94e0ef85eb464b63aa369c59502b505c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Suspected" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Severity is Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Nbd2833cd3cbb45c2b3c69bb380ba5a98", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CostBackup", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Cost of Backup" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cost of Backup" - } - ] - }, - { - "@id": "_:N2340c4661b134a2c9cc101c8b01d730e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Psychological Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N6110ba2312a6483d85eac2fe86aa03c8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ReplacementCosts", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4c9741bd041f4390a8836eff65dee208" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Replacement Costs" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Replacement Costs" - } - ] - }, - { - "@id": "_:N4c9741bd041f4390a8836eff65dee208", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Unwanted Code Deletion" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:N1f6c3e2c744a42c59eacae6d897e5b62", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Risk is Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Payment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Compensation" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Payment provided as compensation (as an impact)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Payment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Identifier associated with an incident" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Identifier" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Detriment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Malfunction" - } - ] - }, - { - "@id": "_:N4777e4a46d124f44bb71227c15e88ef9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:Neb67447161fb4fc6aaf8904c0a3f63b8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@language": "en", + "@value": "Violation of Legal Obligations" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } + ] + }, + { + "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialInvestigationCosts", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11819,9 +8112,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280" + "@id": "_:N498890541a5449e290f0aea406ea5090" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11837,13 +8136,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Investigation Costs" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11854,12 +8153,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Investigation Costs" + "@value": "Scam" } ] }, { - "@id": "_:Ne29eed27ee8e440c906fb2850f283280", + "@id": "_:N498890541a5449e290f0aea406ea5090", "@type": [ "https://schema.org/WebPage" ], @@ -11875,20 +8174,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#hasIncident", + "@id": "https://w3id.org/dpv/risk#RiskControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/vocab/vann/example": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11896,41 +8195,46 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11943,9 +8247,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11961,33 +8271,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -11997,7 +8329,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12013,33 +8345,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostSuspendedOperations", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12052,9 +8384,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12070,65 +8402,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Suspended Operations" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Suspended Operations" - } - ] - }, - { - "@id": "_:Nf10a1f78c715471098e6318f082d4cfe", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12143,13 +8443,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12160,32 +8460,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:Nfb78b2bbe87d49c480955b529b4b3c53", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Component Malfunction" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12195,7 +8485,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12211,49 +8506,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowLikelihood", + "@id": "https://w3id.org/dpv/risk#FinancialImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12268,65 +8547,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk#IncidentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.99,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12337,30 +8598,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Extremely High Risk" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Incident Report" } ] }, @@ -12423,17 +8678,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AttackonPrivateLife", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12446,9 +8695,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N080033b8d0c44467ad532c1c7579376c" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12464,45 +8713,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Attack on Private Life" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Attack on Private Life" - } - ] - }, - { - "@id": "_:N080033b8d0c44467ad532c1c7579376c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12532,13 +8765,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12549,16 +8782,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12571,9 +8804,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff" + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12589,13 +8828,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12606,12 +8845,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:N91d40a0ace014f65a6e0ada110756eff", + "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", "@type": [ "https://schema.org/WebPage" ], @@ -12627,27 +8866,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#OrganisationDisruption", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12662,13 +8885,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Organisation Disruption" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12679,28 +8902,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Organisation Disruption" - } - ] - }, - { - "@id": "_:Nfbdb16615640443180d017267ee66c6a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12717,6 +8924,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -12730,13 +8942,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12747,16 +8959,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostConfiguration", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12769,9 +8981,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0" + "@id": "_:N83bd5296b4d94804a73f0e0518c39495" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12787,13 +9005,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Configuration" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12804,12 +9022,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Configuration" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N177afd5bcc794eb1be5cb8cde85199d0", + "@id": "_:N83bd5296b4d94804a73f0e0518c39495", "@type": [ "https://schema.org/WebPage" ], @@ -12825,11 +9049,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12842,9 +9066,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e" + "@id": "_:N804ad242900c474395dd117c74dace8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12860,13 +9090,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12877,48 +9107,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Nb751f6a2b8f9434ca98bf1b4dd82036e", + "@id": "_:N804ad242900c474395dd117c74dace8e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spying", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12933,13 +9147,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Spying" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12950,32 +9158,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spying" + "@value": "Societal Health & Safety" } ] }, { - "@id": "_:Nf3ad3f60ddc3487f8f1a90672f008993", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountSecurity", + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -12985,12 +9177,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6154893c52c8454b97f4e6057e16f510" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13006,64 +9198,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compromise Account Security" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Security" - } - ] - }, - { - "@id": "_:N6154893c52c8454b97f4e6057e16f510", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Very High Likelihood" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#MisuseBreachedInformation", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13079,13 +9265,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Misuse of Breached Information" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13096,42 +9282,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse of Breached Information" - } - ] - }, - { - "@id": "_:N496723d8108e4f08a9abb844b3fa0a42", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13147,13 +9323,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Reidentification" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13164,31 +9340,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostAcquisition", + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13204,13 +9387,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Acquisition" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13220,29 +9403,13 @@ ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "Cost of Acquisition" - } - ] - }, - { - "@id": "_:N0309eb29885f408bbbb7e502ca9dd354", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13272,13 +9439,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13289,26 +9456,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationOfRights", + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13316,6 +9477,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13324,53 +9490,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#core-properties", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.08,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13381,43 +9547,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactOnDataSubject", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13433,33 +9604,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact on Data Subject" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact on Data Subject" + "@value": "Extremely High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13469,7 +9652,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13485,33 +9673,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossGoodwill", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13524,9 +9712,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13542,49 +9730,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Goodwill" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Goodwill" - } - ] - }, - { - "@id": "_:Neca681b3061d441a82dd8b9b99b5ffe5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13597,9 +9769,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13615,33 +9793,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13651,7 +9845,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13667,33 +9866,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#GovernmentCrisis", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13706,9 +9905,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9" + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13724,13 +9929,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Government Crisis" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13741,12 +9946,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Government Crisis" + "@value": "Security Breach" } ] }, { - "@id": "_:N8e81e5a41ded4ba38981956f811c7fa9", + "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", "@type": [ "https://schema.org/WebPage" ], @@ -13762,11 +9967,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13779,9 +9984,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13797,110 +10008,100 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/name": [ { - "@value": "0.06,xsd:decimal" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13911,32 +10112,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { @@ -13949,37 +10156,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13996,11 +10203,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -14014,13 +10216,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14031,16 +10233,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14053,9 +10255,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487" + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14071,13 +10279,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14088,32 +10296,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N2d7a308dff3c42e1a25938ca4e025487", + "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14126,9 +10340,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35" + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14144,13 +10364,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14161,37 +10381,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N32e74c07bd9144da9cd33c8685058b35", + "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -14204,6 +10418,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14212,33 +10431,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#CyberStalking", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -14248,12 +10467,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14269,49 +10483,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cyber Stalking" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cyber Stalking" - } - ] - }, - { - "@id": "_:N9452c153c09d4d70883a5384d8d2044f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -14321,12 +10519,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1b96d48534be4188984fec841d97a254" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14342,49 +10540,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" - } - ] - }, - { - "@id": "_:N1b96d48534be4188984fec841d97a254", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Moderate Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -14394,12 +10588,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14415,43 +10604,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14465,50 +10653,45 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Damage" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes harms" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationRegulatoryObligations", + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14524,45 +10707,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Regulatory Obligations" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Regulatory Obligations" - } - ] - }, - { - "@id": "_:N2308ca4852bb423980d3661e2bb44c90", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14581,7 +10748,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14603,7 +10770,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14614,12 +10781,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14638,7 +10805,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14654,13 +10821,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14671,21 +10838,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -14698,6 +10859,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14706,33 +10872,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationTrustImpact", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14745,9 +10911,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14763,64 +10929,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Reputation and trust impact" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputation and trust impact" - } - ] - }, - { - "@id": "_:N95710dffd5c246eeb73b9a66d5bdd642", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Businessdisruption", + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-12" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na71895376af947a9838430e3e01d3915" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14828,67 +10973,57 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Business disruption" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Business disruption" - } - ] - }, - { - "@id": "_:Na71895376af947a9838430e3e01d3915", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14904,13 +11039,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Reward provided as compensation (as an impact)" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14921,36 +11056,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.12,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14961,33 +11096,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14997,7 +11132,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15013,43 +11153,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15065,33 +11210,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Misuse" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalStalking", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -15104,9 +11249,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15122,63 +11267,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Stalking" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Stalking" - } - ] - }, - { - "@id": "_:N4e27c5d26dce4417912b8e4bb56310ec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15187,44 +11306,55 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15235,33 +11365,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15274,9 +11420,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc" + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15292,13 +11444,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15309,32 +11461,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:N5bf12e43518b4117b3f487eb4ab935fc", + "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15344,7 +11496,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15360,33 +11523,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15399,9 +11587,23 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15417,48 +11619,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Data Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.40,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15474,43 +11693,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceForDataSubject", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-10-22" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15526,33 +11750,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Consequence for Data Subject" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence for Data Subject" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15562,7 +11786,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0282f3114f5b4278b632620b9b954c7d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15578,33 +11813,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Lose of Reputation" + } + ] + }, + { + "@id": "_:N0282f3114f5b4278b632620b9b954c7d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossProprietaryInformation", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15617,9 +11868,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N991585ef26bb47108970a62346663fd8" + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15630,18 +11887,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Proprietary Information" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15652,12 +11909,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Proprietary Information" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N991585ef26bb47108970a62346663fd8", + "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", "@type": [ "https://schema.org/WebPage" ], @@ -15673,11 +11936,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#CostInstallation", + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15690,9 +11953,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f" + "@id": "_:N0296c48d481641d492572a05652b6bf5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15708,13 +11977,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Installation" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15725,12 +11994,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Installation" + "@value": "Financial Loss" } ] }, { - "@id": "_:Nde18ebf62fe2430cb75ab0228c4d341f", + "@id": "_:N0296c48d481641d492572a05652b6bf5", "@type": [ "https://schema.org/WebPage" ], @@ -15746,11 +12015,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -15760,12 +12029,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15781,42 +12045,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "@id": "https://w3id.org/dpv/risk#HighRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15830,247 +12100,189 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "High Risk" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ - { - "@value": "Rob Brennan" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Julio Fernandez" - }, { "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "0.01,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "accepted" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "Level where Likelihood is Extremely Low" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" + "@value": "Extremely Low Likelihood" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Risk Concepts" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://purl.org/dc/terms/created": [ { - "@value": "10.5281/zenodo.12505841" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/ontology/bibo/status": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://purl.org/dc/terms/source": [ { - "@value": "risk" + "@id": "_:N12b2c9394da44250a5ab771adc23fab8" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "RISK" + "@value": "accepted" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "Unwanted Disclosure of Data" } + ] + }, + { + "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16083,9 +12295,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48" + "@id": "_:Nbb93cef662444084828d04948d35895d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16101,13 +12319,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16118,32 +12336,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Lose of Trust" } ] }, { - "@id": "_:Nf5bcaae6cfa6438c91e4cfa74d78ad48", + "@id": "_:Nbb93cef662444084828d04948d35895d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossData", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -16153,17 +12370,22 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc" + "@id": "_:N837e146fba804365b9e619c05849f3d1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16174,70 +12396,76 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Data" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Data" + "@value": "Risk Analysis" } ] }, { - "@id": "_:N83c3d7dd3bd04c74b5ca330e38d501cc", + "@id": "_:N837e146fba804365b9e619c05849f3d1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk#Incident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.73,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16245,6 +12473,14 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16253,33 +12489,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossAssets", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16292,9 +12537,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16310,65 +12555,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Assets" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Assets" - } - ] - }, - { - "@id": "_:Nc4955bf8b52347fcbec6a94a36f5405b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16383,48 +12596,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskControl", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16432,11 +12640,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16445,49 +12648,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.80,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16502,38 +12689,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16549,49 +12747,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16606,38 +12788,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Threat", + "@id": "https://w3id.org/dpv/risk#IncidentHalted", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { @@ -16650,11 +12832,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16663,29 +12840,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk#Vulnerability", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -16693,7 +12870,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16703,64 +12880,53 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.16,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16771,33 +12937,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16810,9 +12976,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16828,49 +12994,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional use of software by including or inserting in a system for a harmful purpose" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:Nbccec8cc0def44d2aebfd7dbcdbb9802", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16880,7 +13030,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16896,33 +13051,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16935,9 +13090,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N796489c956df43e6941a9ff63835f450" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16953,45 +13108,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:N796489c956df43e6941a9ff63835f450", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17008,6 +13147,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -17021,13 +13165,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17038,16 +13185,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#DamageByThirdParty", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -17060,9 +13213,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca" + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17078,13 +13237,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Damage by Third Party" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17095,32 +13254,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage by Third Party" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:N4d4f91f15db84ceaa9afac8a35156cca", + "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -17133,9 +13292,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f" + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17151,13 +13316,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17168,28 +13333,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Nc9923888c2d6471f99907b3d36293a6f", + "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17208,7 +13373,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17230,7 +13395,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17241,26 +13406,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17268,6 +13427,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17276,49 +13440,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17333,39 +13481,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Concepts associated with security threats and issues that originate within the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Internal Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PrivacyImpact", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -17378,9 +13520,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101" + "@id": "_:Neb960f38438d48258bee0ebae96be48e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17396,45 +13544,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Privacy impact" + "@value": "Something that acts as or causes Cryptojacking" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cryptojacking" + } + ] + }, + { + "@id": "_:Neb960f38438d48258bee0ebae96be48e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Privacy impact" + "@value": "accepted" } - ] - }, - { - "@id": "_:N2aa10d7df0fc40d8bd372984065a7101", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17453,7 +13630,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17475,7 +13652,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17486,16 +13663,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17508,9 +13685,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N14d996959dc44ec4a227c5167adbad30" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17526,49 +13703,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N14d996959dc44ec4a227c5167adbad30", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalSpying", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17581,9 +13742,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7757aee6b2134fec952a142a9d692e19" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17599,60 +13760,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical Spying" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Spying" - } - ] - }, - { - "@id": "_:N7757aee6b2134fec952a142a9d692e19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17667,44 +13801,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17719,33 +13842,27 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostJudicialProceedings", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -17758,9 +13875,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57" + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17776,13 +13899,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Judicial Proceedings" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17793,12 +13916,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Judicial Proceedings" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:Neb64f84b798543c29561659aa0ed6e57", + "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", "@type": [ "https://schema.org/WebPage" ], @@ -17814,10 +13937,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17827,12 +13951,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17840,11 +13964,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Status" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17853,29 +13972,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17905,13 +14024,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17922,16 +14041,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptionCommunications", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17944,9 +14063,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb9fe3106440c4546b4b449106947b906" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17962,64 +14081,137 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Interception of Communications" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "_:Nb9fe3106440c4546b4b449106947b906", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.31,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM7x7 S:5 L:3)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18035,52 +14227,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#SourceControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Incident" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18094,54 +14277,61 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18152,33 +14342,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18191,9 +14397,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc" + "@id": "_:N0d138f94265e46f293490fbe0fc8074c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18209,13 +14421,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18226,12 +14438,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:Nebbc4a753ddd476ab4026385ad5fb4bc", + "@id": "_:N0d138f94265e46f293490fbe0fc8074c", "@type": [ "https://schema.org/WebPage" ], @@ -18247,7 +14459,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk#IntegrityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -18265,7 +14477,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18276,13 +14488,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18293,16 +14505,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#CostJudicialPenalties", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18315,9 +14527,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18333,49 +14545,80 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Cost of Judicial Penalties" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cost of Judicial Penalties" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "_:N5b8006c999374a85badf5accd9ebcf34", + "@id": "https://w3id.org/dpv/risk#ReductionControl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the likelihood or severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnknownVulnerabilityExploited", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18388,9 +14631,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d" + "@id": "_:N7f1dc230141c4448a99f28f362191020" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18406,13 +14655,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unknown Vulnerability Exploited" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18423,63 +14672,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unknown Vulnerability Exploited" - } - ] - }, - { - "@id": "_:Nf2396c59ab444c899bdce0376d16b96d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Equipment Malfunction" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:N7f1dc230141c4448a99f28f362191020", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/guides" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LawEnforcementAdverseEffects", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -18489,12 +14713,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18510,49 +14729,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Law Enforcement Adverse Effects" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Law Enforcement Adverse Effects" - } - ] - }, - { - "@id": "_:N8fbc05413e3144a4b2e8b87263524019", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -18562,7 +14765,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18578,33 +14781,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes damages" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18617,9 +14820,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18635,49 +14838,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N7610132cca1548f0b0a3ce69e9fca46e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -18692,7 +14879,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18708,19 +14895,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18731,18 +14912,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" + "@value": "Extremely High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18761,7 +14942,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18777,13 +14958,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18794,20 +14975,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", + "@id": "https://w3id.org/dpv/risk#causedByThreat", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18815,42 +15001,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18869,7 +15050,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18891,7 +15072,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18902,39 +15083,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2" + "@value": "2022-08-18" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18950,13 +15124,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18967,42 +15141,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:Ne58b24cbe67041719f45a8e97a6fcdc2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Limitation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N842f6dd3b92c482180f56ce6a495c382" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19018,13 +15193,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Benefit" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compensation provided (as an impact)" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19035,26 +15210,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Distributed Denial of Service Attack (DDoS)" + } + ] + }, + { + "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#EconomicDisadvantage", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19070,33 +15266,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Economic Disadvantage" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCompetitiveAdvantage", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19109,9 +15305,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19127,49 +15323,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Competitive Advantage" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Competitive Advantage" - } - ] - }, - { - "@id": "_:Ne9619e3e28224696855ad79ca9bed2b4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19182,9 +15362,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19200,49 +15380,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:N28bb9c0dc6e846c59a438dd5eda86140", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncreaseInternalCost", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19255,9 +15419,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3" + "@id": "_:Nbeddee22b7a841e39879764ab63949f8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19273,13 +15443,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19290,32 +15460,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Increase Internal Cost" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N8ca260b31f1e4f67b95dc5bb8c5a45b3", + "@id": "_:Nbeddee22b7a841e39879764ab63949f8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RetrievalDeletedData", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19325,12 +15495,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961" + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19346,13 +15522,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Retrieval of Deleted Data" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19363,12 +15539,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Retrieval of Deleted Data" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:Nac47b8f5eded4f2d94c2adef132bf961", + "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", "@type": [ "https://schema.org/WebPage" ], @@ -19384,14 +15560,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ @@ -19414,7 +15590,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19425,20 +15601,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "has incident" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19448,12 +15625,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2b3cb59e522845058c138349bfaee11f" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19461,11 +15638,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19474,65 +15646,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N2b3cb59e522845058c138349bfaee11f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.41,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -19547,47 +15687,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk#ThreatSource", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19596,30 +15748,51 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Public Order Breach" + } + ] + }, + { + "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialEquipmentCosts", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19629,12 +15802,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19650,13 +15824,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19667,42 +15841,68 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Equipment Costs" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:N2d49330f272447e6aa0a41c56f6bb33d", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Impact" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19718,33 +15918,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Renumeration provided as compensation (as an impact)" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19757,9 +15957,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4b03b00cf447447bb996b08636f08431" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19775,49 +15975,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:N4b03b00cf447447bb996b08636f08431", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk#MonitorImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19827,12 +16011,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19848,59 +16027,90 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Monitor Impact" } ] }, { - "@id": "_:N2960b4e89ed24ac88d01441397c465bd", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@language": "en", + "@value": "Low Risk (RM5x5 S:2 L:2)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -19913,35 +16123,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -19951,12 +16161,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19972,29 +16177,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -20013,7 +16218,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.11,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20029,13 +16234,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20046,22 +16251,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@id": "https://w3id.org/dpv/risk#core-classes", "@type": [ "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -20071,12 +16276,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20092,63 +16297,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "_:N3aa4650582604557b489e9ed7e21a1f7", + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@id": "https://w3id.org/dpv#Incident" } ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@id": "https://w3id.org/dpv#Risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/examples#E0069" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20157,55 +16362,54 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.33,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20216,33 +16420,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolationStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20255,9 +16459,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477" + "@id": "_:N8193907d23bd43dc8b146573989b8a0d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20273,13 +16483,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20290,32 +16500,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:N4dc24789862a46ae9df360fe7a68f477", + "@id": "_:N8193907d23bd43dc8b146573989b8a0d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemedyControl", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -20328,6 +16537,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Notice" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -20336,33 +16550,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20375,9 +16589,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2adacc609baf48e9b49883302a41f00c" + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20393,13 +16613,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20410,32 +16630,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N2adacc609baf48e9b49883302a41f00c", + "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -20448,9 +16668,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20466,59 +16686,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Coercion" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N7f7290e070a94be28bd4690225f5cb5c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20534,33 +16744,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20570,12 +16780,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20591,33 +16802,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossTrust", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -20630,9 +16841,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N581201da4fd547aea094261f8d92243c" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20648,45 +16859,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Trust" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Trust" - } - ] - }, - { - "@id": "_:N581201da4fd547aea094261f8d92243c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -20705,7 +16900,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20721,13 +16916,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20738,36 +16933,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.24,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20776,35 +16965,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20817,9 +17001,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.29,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20835,47 +17025,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20889,40 +17091,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ImpactControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20935,9 +17132,18 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.41,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N51a29309d655420e8611a50e7d2baa7c" + }, + { + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20953,29 +17159,61 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@id": "_:N51a29309d655420e8611a50e7d2baa7c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ThreatSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -20983,7 +17221,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20993,7 +17231,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -21002,49 +17240,50 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.33,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -21055,47 +17294,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.43,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -21106,33 +17351,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DangertoPersonnel", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21145,9 +17390,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6175971113014283a5d3202f299a2a09" + "@id": "_:N1802c2900f5b4c578896c91c3149381d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21158,18 +17409,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Danger to Personnel" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21180,12 +17431,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Danger to Personnel" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N6175971113014283a5d3202f299a2a09", + "@id": "_:N1802c2900f5b4c578896c91c3149381d", "@type": [ "https://schema.org/WebPage" ], @@ -21201,11 +17458,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#ShareRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -21215,12 +17472,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21236,49 +17488,90 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scam" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Share Risk" } ] }, { - "@id": "_:Nfcbda971b1fe4bac9f2c49b3efeba01e", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -21288,7 +17581,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21304,33 +17602,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Damage" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Impact that acts as or causes non-material damages" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21343,9 +17641,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3ef9f5a9eb554279905f69c263712205" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21361,54 +17665,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@id": "_:N3ef9f5a9eb554279905f69c263712205", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk#IdentificationControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21424,33 +17728,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21460,7 +17764,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21476,48 +17791,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21533,33 +17865,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21572,9 +17904,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N849c56349f884574b5accd799cf4b01d" + "@id": "_:N2039355de6a7474a8ab35355297e33c6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21590,13 +17928,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Customer Confidence" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21607,47 +17945,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Customer Confidence" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N849c56349f884574b5accd799cf4b01d", + "@id": "_:N2039355de6a7474a8ab35355297e33c6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.02,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21663,48 +18002,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.12,xsd:decimal" + "@id": "_:Nad476399871e41a5bd37e1133df27770" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21720,29 +18065,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "_:Nad476399871e41a5bd37e1133df27770", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -21761,7 +18122,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21777,13 +18138,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21794,16 +18155,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21816,6 +18177,12 @@ "@value": "2022-08-19" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -21829,13 +18196,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21846,16 +18213,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21868,9 +18235,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c" + "@id": "_:N9ba04625c759479eba79e0016163e8e6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21881,18 +18254,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21903,12 +18276,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Negotiating Capacity" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:Na9bafbaad04947e1bfd855ae02cf137c", + "@id": "_:N9ba04625c759479eba79e0016163e8e6", "@type": [ "https://schema.org/WebPage" ], @@ -21924,11 +18303,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#TheftEquipment", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21941,9 +18320,15 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee206c8da189455dba93fd20501581cb" + "@id": "_:N347037135ba54cefae0a2a69a47e52d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21959,13 +18344,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaterialDamage" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21976,12 +18361,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Theft of Equipment" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:Nee206c8da189455dba93fd20501581cb", + "@id": "_:N347037135ba54cefae0a2a69a47e52d9", "@type": [ "https://schema.org/WebPage" ], @@ -21997,62 +18382,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Handling Report" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -22065,6 +18399,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -22078,13 +18417,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -22095,12 +18437,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Very High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -22119,7 +18467,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22135,13 +18483,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -22152,16 +18500,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -22171,12 +18519,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22192,33 +18540,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -22228,7 +18585,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22244,33 +18612,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -22280,12 +18664,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22301,64 +18680,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#LossCredibility", + "@id": "https://w3id.org/dpv/risk#LowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -22368,12 +18716,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22389,49 +18737,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Loss of Credibility" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Loss of Credibility" - } - ] - }, - { - "@id": "_:Ndcf48e5dae2a481ca23340b8b76dd24d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Low Likelihood" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -22444,9 +18788,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22462,59 +18806,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N70e8ae5edb764d638b33e8e5897227fe", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvoidSource", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22530,33 +18864,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#IncidentRegister", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -22566,17 +18899,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.75,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -22587,45 +18920,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -22638,9 +18959,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22656,49 +18977,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:Ne42a95638f2d45b8969bfffd2ad98503", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -22708,12 +19013,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22729,37 +19034,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Very Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22769,7 +19093,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -22780,33 +19104,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialPersonnelCosts", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Risk" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -22816,12 +19140,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22837,71 +19161,30 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Detriment" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Personnel Costs" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Personnel Costs" - } - ] - }, - { - "@id": "_:Neb9ead5822a7477992361ffb0b227fd8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" + "@value": "Extremely Low Severity" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] } diff --git a/2.1-dev/risk/risk.n3 b/2.1-dev/risk/risk.n3 index 1205451dd..2c375f60a 100644 --- a/2.1-dev/risk/risk.n3 +++ b/2.1-dev/risk/risk.n3 @@ -124,21 +124,6 @@ risk:7SeverityLevels a rdfs:Class, skos:inScheme risk:risk-levels-classes ; skos:prefLabel "7 Severity Levels"@en . -risk:AbusiveContentUtilisation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Abusive Content Utilisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Abusive Content Utilisation"@en . - risk:AccidentalIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -150,36 +135,40 @@ risk:AccidentalIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Accidental Incident"@en . -risk:AttackonPrivateLife a rdfs:Class, +risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Attack on Private Life"@en ; + skos:broader risk:UserRisks ; + skos:definition "Accidental Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Attack on Private Life"@en . + skos:prefLabel "Accidental Misuse"@en . risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Authorisation Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . +risk:AvailabilityBreach a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . + risk:AvailabilityIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -205,91 +194,49 @@ risk:AvoidSource a rdfs:Class, risk:Benefit a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes benefits"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Benefit"@en . risk:Blackmail a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Blackmail"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Brute Force Authorisations"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . -risk:BusinessImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Business impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business impact"@en . - -risk:BusinessPerformanceImpairment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business Performance Impairment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business Performance Impairment"@en . - -risk:Businessdisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business disruption"@en . - risk:ChangeConsequence a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -314,135 +261,102 @@ risk:ChangeImpact a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Change Impact"@en . -risk:ChildViolence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Child Violence"@en . - -risk:CitizensImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Citizens impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Citizens impact"@en . - risk:Coercion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Coercion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . risk:Compensation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Benefit ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compensation"@en . -risk:ComplianceImpact a rdfs:Class, +risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Compliance impact"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compliance impact"@en . + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk:CompromiseAccount a rdfs:Class, +risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account"@en . + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk:CompromiseAccountCredentials a rdfs:Class, +risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account Credentials"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:prefLabel "Compromise Account"@en . -risk:CompromiseAccountSecurity a rdfs:Class, +risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Compromise Account Security"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Security"@en . + skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Confidentiality Breach"@en ; + skos:broader risk:DataBreach ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -469,30 +383,6 @@ risk:ConsequenceControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Consequence Control"@en . -risk:ConsequenceForDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence for Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk:ConsequenceOnDataSecurity a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence on Data Security"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence on Data Security"@en . - risk:ContainmentControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -506,154 +396,20 @@ risk:ContainmentControl a rdfs:Class, risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Copyright Violation"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Copyright Violation"@en . -risk:CorruptionData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Corruption of Data"@en . - -risk:CostAcquisition a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Acquisition"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Acquisition"@en . - -risk:CostBackup a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Backup"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Backup"@en . - -risk:CostConfiguration a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Configuration"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Configuration"@en . - -risk:CostInstallation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Installation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Installation"@en . - -risk:CostJudicialPenalties a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk:CostJudicialProceedings a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk:CostOperationInterruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Operation Interruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk:CostSuspendedOperations a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Suspended Operations"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk:CrossBorderIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -667,122 +423,67 @@ risk:CrossBorderIncident a rdfs:Class, risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . -risk:CyberSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Spying"@en . - -risk:CyberStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Stalking"@en . - risk:Damage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Damage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Damage"@en . -risk:DamageByThirdParty a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Damage by Third Party"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Damage by Third Party"@en . - -risk:DangertoCustomers a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Customers"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Customers"@en . - -risk:DangertoPersonnel a rdfs:Class, +risk:DataBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex:E0069, + dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Personnel"@en ; + skos:broader risk:SecurityBreach ; + skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Personnel"@en . + skos:prefLabel "Data Breach"@en . -risk:DataBreach a rdfs:Class, +risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex:E0069, - dex:E0071 ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Data Breach"@en ; + sw:term_status "modified"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Data Breach"@en . + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk:DeliberateIncident a rdfs:Class, skos:Concept ; @@ -797,16 +498,20 @@ risk:DeliberateIncident a rdfs:Class, risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -823,84 +528,45 @@ risk:DetectionControl a rdfs:Class, risk:Detriment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Detriment"@en . -risk:DetrimentToRecovery a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Detriment to Recovery"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Detriment to Recovery"@en . - risk:Discrimination a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Discrimination"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . - -risk:Eavesdropping a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Eavesdropping"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Eavesdropping"@en . - -risk:EconomicDisadvantage a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Economic Disadvantage"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Economic Disadvantage"@en . + skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk:EnvironmentalIncident a rdfs:Class, skos:Concept ; @@ -913,78 +579,106 @@ risk:EnvironmentalIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Environmental Incident"@en . -risk:EnvironmentalSafetyEndangerment a rdfs:Class, +risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Environmental Safety Endangerment"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:prefLabel "Environmental Risk"@en . risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Equipment Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Failure"@en . + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Equipment Malfunction"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Malfunction"@en . + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Erroneous System Use"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Erroneous System Use"@en . +risk:ExposureToHarmfulSpeech a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk:ExternalSecurityThreat a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "External Security Threat"@en . + risk:Extorsion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Extorsion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -1074,122 +768,60 @@ risk:ExtremelyLowSeverity a rdfs:Class, risk:Fee a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + sw:term_status "modified"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fee"@en . -risk:FinancialEquipmentCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Equipment Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk:FinancialInvestigationCosts a rdfs:Class, +risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Investigation Costs"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Financial Loss"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Financial Loss"@en . -risk:FinancialPersonnelCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Personnel Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk:FinancialRepairCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Repair Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Repair Costs"@en . - risk:Fraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Fraud"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . -risk:GovernmentCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Government Crisis"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Government Crisis"@en . - risk:HaltSource a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -1204,45 +836,17 @@ risk:HaltSource a rdfs:Class, risk:Harm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes harms"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harm"@en . - -risk:HarmfulSpeech a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harmful Speech"@en . - -risk:HealthLifeImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Health and life impact"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Harm to humans"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Health and life impact"@en . + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk:HighLikelihood a rdfs:Class, skos:Concept, @@ -1294,16 +898,17 @@ risk:HighSeverity a rdfs:Class, risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Human Errors"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Human Errors"@en . @@ -1318,62 +923,54 @@ risk:IdentificationControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Identification Control"@en . -risk:IdentityDispute a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Identity Dispute"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Identity Dispute"@en . - risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Fraud"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Theft"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . -risk:IllegalProcessingData a rdfs:Class, +risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Illegal Processing of Data"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Illegal Processing of Data"@en . + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . risk:ImpactControl a rdfs:Class, skos:Concept, @@ -1387,43 +984,19 @@ risk:ImpactControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Impact Control"@en . -risk:ImpactOnDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact on Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact on Data Subject"@en . - -risk:ImpactToRights a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact to Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact to Rights"@en . - risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date, "2024-05-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex:E0069, dex:E0070 ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf rdfs:Class, + dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "An actual or occured event"@en ; skos:inScheme risk:core-classes, risk:incident-classes ; @@ -1683,51 +1256,47 @@ risk:IncidentTerminated a rdfs:Class, skos:inScheme risk:incident-status-classes ; skos:prefLabel "Incident Terminated"@en . -risk:IncreaseInternalCost a rdfs:Class, +risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Increase Internal Cost"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Increase Internal Cost"@en . + skos:prefLabel "Individual Health & Safety"@en . -risk:IndustrialCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk:IndividualRisk a rdfs:Class, + skos:Concept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Industrial Crisis"@en ; + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Industrial Crisis"@en . + skos:prefLabel "Individual Risk"@en . risk:Injury a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Injury"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Injury"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Injury"@en . +risk:IntegrityBreach a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . + risk:IntegrityIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -1739,344 +1308,184 @@ risk:IntegrityIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Integrity Incident"@en . -risk:InterceptionCommunications a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Interception of Communications"@en . - -risk:InternalOperationDisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Internal Operation Disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk:KnownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk:LawEnforcementAdverseEffects a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . - -risk:LimitationOfRights a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Limitation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Limitation of Rights"@en . - -risk:LossAssets a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Assets"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Assets"@en . - -risk:LossCompetitiveAdvantage a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Competitive Advantage"@en . - -risk:LossControlOverData a rdfs:Class, +risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Control over Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Control over Data"@en . - -risk:LossCredibility a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Credibility"@en . - -risk:LossCustomerConfidence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Customer Confidence"@en ; + skos:broader risk:UserRisks ; + skos:definition "Intentional Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customer Confidence"@en . + skos:prefLabel "Intentional Misuse"@en . -risk:LossCustomers a rdfs:Class, +risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Customers"@en ; + sw:term_status "modified"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customers"@en . + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:LossData a rdfs:Class, +risk:InternalSecurityThreat a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Data"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Data"@en . + skos:prefLabel "Internal Security Threat"@en . -risk:LossFunds a rdfs:Class, +risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Funds"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Funds"@en . + skos:prefLabel "Judicial Costs"@en . -risk:LossGoods a rdfs:Class, +risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Goods"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goods"@en . + skos:prefLabel "Judicial Penalty"@en . -risk:LossGoodwill a rdfs:Class, +risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Goodwill"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goodwill"@en . + skos:prefLabel "Legal Risk"@en . -risk:LossNegotiatingCapacity a rdfs:Class, +risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Negotiating Capacity"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Credibility"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:prefLabel "Lose of Credibility"@en . -risk:LossOpportunity a rdfs:Class, +risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Opportunity"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Opportunity"@en . + skos:prefLabel "Lose of Customer Confidence"@en . -risk:LossProprietaryInformation a rdfs:Class, +risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Proprietary Information"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:prefLabel "Lose of Goodwill"@en . -risk:LossReputation a rdfs:Class, +risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Reputation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Reputation"@en . - -risk:LossResources a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Resources"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Resources"@en . + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk:LossSuppliers a rdfs:Class, +risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Suppliers"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Suppliers"@en . + skos:prefLabel "Lose of Opportunity"@en . -risk:LossTechnologicalAdvantage a rdfs:Class, +risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Technological Advantage"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Reputation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:prefLabel "Lose of Reputation"@en . -risk:LossTrust a rdfs:Class, +risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Trust"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Trust"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Trust"@en . + skos:prefLabel "Lose of Trust"@en . risk:LowLikelihood a rdfs:Class, skos:Concept, @@ -2128,88 +1537,63 @@ risk:LowSeverity a rdfs:Class, risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-03-30"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Material Damage"@en . - -risk:MisinformationDisinformation a rdfs:Class, - skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; + dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk:Misuse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Misuse"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Misuse"@en . -risk:MisuseBreachedInformation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Misuse of Breached Information"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misuse of Breached Information"@en . - risk:ModerateLikelihood a rdfs:Class, skos:Concept, dpv:Likelihood ; @@ -2345,187 +1729,136 @@ risk:MonitorVulnerabilities a rdfs:Class, risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes non-material damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Non-Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Non-Material Damage"@en . + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk:OrganisationDisruption a rdfs:Class, +risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Organisation Disruption"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Organisation Disruption"@en . + skos:prefLabel "Operational Security Risk"@en . risk:Payment a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Personal Safety Endangerment"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Personal Safety Endangerment"@en . -risk:PersonnelAbsence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Personnel Absence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Personnel Absence"@en . - risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Physical Assault"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Physical Assault"@en . -risk:PhysicalSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Spying"@en . - -risk:PhysicalStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Stalking"@en . - -risk:PreventExercisingOfRights a rdfs:Class, +risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Prevent Exercising of Rights"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk:PrivacyImpact a rdfs:Class, +risk:Privacy a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Privacy impact"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Psychological Harm"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Public Order Breach"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Public Order Breach"@en . @@ -3608,24 +2941,6 @@ risk:RM7x7S7L7 a rdfs:Class, skos:inScheme risk:risk-matrix-classes ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . -risk:RansomwareAttack a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Ransomware Attack"@en . - risk:RecoveryControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3674,15 +2989,17 @@ risk:ReductionControl a rdfs:Class, risk:Reidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Re-identification"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Re-identification"@en . + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . risk:RemedyControl a rdfs:Class, skos:Concept, @@ -3695,21 +3012,6 @@ risk:RemedyControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Remedy Control"@en . -risk:RemoteSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Remote Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Remote Spying"@en . - risk:RemoveConsequence a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3748,87 +3050,99 @@ risk:RemoveSource a rdfs:Class, risk:Renumeration a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Remuneration"@en . -risk:ReplacementCosts a rdfs:Class, +risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Replacement Costs"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Replacement Costs"@en . + skos:prefLabel "Reputational Risk"@en . -risk:ReputationTrustImpact a rdfs:Class, +risk:Reward a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Reputation and trust impact"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reputation and trust impact"@en . + skos:prefLabel "Reward"@en . -risk:RetrievalDeletedData a rdfs:Class, +risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Deleted Data"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk:RetrievalDiscardedEquipment a rdfs:Class, +risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Discarded Equipment"@en ; + skos:broader dpv:Impact, + risk:SocietalRisk ; + skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk:Reward a rdfs:Class, +risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Reward provided as compensation (as an impact)"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Limitation of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reward"@en . + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + +risk:RightsViolation a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk:RiskAnalysis a rdfs:Class, skos:Concept ; @@ -3934,85 +3248,86 @@ risk:RiskMatrix7x7 a rdfs:Class, risk:RiskSource a rdfs:Class, skos:Concept ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:inScheme risk:core-classes ; skos:prefLabel "Risk Source"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sabotage"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . risk:Scam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Scam"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . -risk:SecurityBreach a rdfs:Class, +risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Security Breach"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Security Breach"@en . + skos:prefLabel "Security Attack"@en . -risk:ServiceInterruption a rdfs:Class, +risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Service Interruption"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Service Interruption"@en . + skos:prefLabel "Security Breach"@en . risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sexual Violence"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sexual Violence"@en . @@ -4030,208 +3345,134 @@ risk:ShareRisk a rdfs:Class, risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Social Disadvantage"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Social Disadvantage"@en . -risk:SourceControl a rdfs:Class, - skos:Concept, - risk:RiskControl ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2024-05-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RiskControl ; - skos:definition "Risk Mitigation Measure that controls the Source"@en ; - skos:inScheme risk:risk-controls-classes ; - skos:prefLabel "Source Control"@en . - -risk:Spam a rdfs:Class, +risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spam"@en ; + skos:broader risk:SocietalRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spam"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk:Spoofing a rdfs:Class, +risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spoofing"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spoofing"@en . + skos:prefLabel "Societal Risk"@en . -risk:Spying a rdfs:Class, +risk:SourceControl a rdfs:Class, skos:Concept, - dpv:Risk ; + risk:RiskControl ; dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dct:created "2024-05-19"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spying"@en . + skos:broader risk:RiskControl ; + skos:definition "Risk Mitigation Measure that controls the Source"@en ; + skos:inScheme risk:risk-controls-classes ; + skos:prefLabel "Source Control"@en . -risk:Stalking a rdfs:Class, +risk:Spoofing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Stalking"@en ; + skos:broader risk:ExternalSecurityThreat, + risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Stalking"@en . + skos:prefLabel "Spoofing"@en . risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Failure"@en . + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Intrusion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Malfunction"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Malfunction"@en . + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Terrorism"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Terrorism"@en . -risk:Theft a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft"@en . - -risk:TheftEquipment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Equipment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Equipment"@en . - -risk:TheftMedia a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Media"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Media"@en . - -risk:ThirdPartyOperationDisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Third Party Operation Disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Third Party Operation Disruption"@en . - risk:Threat a rdfs:Class, skos:Concept ; dct:created "2024-02-14"^^xsd:date ; @@ -4255,270 +3496,260 @@ risk:ThreatSource a rdfs:Class, risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Access to Premises"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . +risk:UnauthorisedActivity a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Unauthorised Activity"@en . + risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised Code Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Data Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . -risk:UnauthorisedImpersonation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Impersonation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Reidentification ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Resource Use"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised System Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised System Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . -risk:UnknownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Code Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Data Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk:Vandalism a rdfs:Class, +risk:UserRisks a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Vandalism"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vandalism"@en . + skos:prefLabel "User Risks"@en . risk:VeryHighLikelihood a rdfs:Class, skos:Concept, @@ -4610,92 +3841,117 @@ risk:VeryLowSeverity a rdfs:Class, skos:prefLabel "Very Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1"@en . -risk:ViolationCodeConduct a rdfs:Class, +risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Code of Conduct"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Code of Conduct"@en . + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk:ViolationContractualObligations a rdfs:Class, +risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Contractual Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Contractual Obligations"@en . + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk:ViolationEthicalCode a rdfs:Class, +risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Ethical Code"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Ethical Code"@en . + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk:ViolationOfRights a rdfs:Class, +risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; + rdfs:isDefinedBy risk: ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . + +risk:ViolatingPolicy a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Violation of Rights"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Rights"@en . + skos:prefLabel "Violating Policy"@en . -risk:ViolationRegulatoryObligations a rdfs:Class, +risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Regulatory Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk:ViolationStatutoryObligations a rdfs:Class, +risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Statutory Obligations"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Child Violence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk:Vulnerability a rdfs:Class, skos:Concept ; @@ -4709,34 +3965,20 @@ risk:Vulnerability a rdfs:Class, risk:VulnerabilityCreated a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Created"@en ; + skos:broader risk:InternalSecurityThreat ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Vulnerability Created"@en . -risk:VulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Exploited"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/risk.rdf b/2.1-dev/risk/risk.rdf index 89abc6d9c..484e39a72 100644 --- a/2.1-dev/risk/risk.rdf +++ b/2.1-dev/risk/risk.rdf @@ -13,834 +13,828 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.08,xsd:decimal + + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 + accepted + + + + - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + + - - - Incident Status Unknown - The status of a incident is unknown - + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - Deliberate Incident - Incident caused due to deliberate actions of a human - - - 2024-05-19 + + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + - - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal - 2022-08-17 + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Loss of Customers - Loss of Customers - - + + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Loss of Technological Advantage - Loss of Technological Advantage - - - 2022-08-17 + + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - - Identity Fraud - Identity Fraud - - + + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 0.80,xsd:decimal + 0.64,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Consequence on Data Security - Consequence on Data Security - - 2022-10-22 + + Phishing Scam + Something that acts as or causes Phishing Scam + + + 2022-08-17 + 2024-08-16 accepted - Harshvardhan J. Pandit, Georg P. Krog + Harshvardhan J. Pandit - + - - Identity Theft - Identity Theft - - + + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + + 0.71,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Unauthorised Resource Use - Unauthorised Resource Use - - - 2022-08-17 + + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Eavesdropping - Eavesdropping - - - 2022-08-17 + + Incident Ongoing + The incident is ongoing i.e. still active + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Ransomware Attack - Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality - - - - 2022-08-17 + Deliberate Incident + Incident caused due to deliberate actions of a human + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Misuse of Breached Information - Misuse of Breached Information - - + + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.24,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - HTML serialiation + + + - - - Cost of Judicial Penalties - Cost of Judicial Penalties - - - 2022-08-17 + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Unauthorised Re-Identification - Unauthorised Re-Identification - - 2022-08-19 + + Avoid Source + Control that avoids the risk source + + 2024-05-19 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - + - - Interception of Communications - Interception of Communications - - + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Incident Notice - Notice associated with an Incident - - - 2024-05-19 + + Fraud + Something that acts as or causes Fraud + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + - - Low Severity - Level where Severity is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + Very High Risk + Level where Risk is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - - - - - Moderate Severity - Level where Severity is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - 0.71,xsd:decimal + High Risk (RM3x3 S:3 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.67,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Financial Personnel Costs - Financial Personnel Costs - - + + Sexual Violence + Something that acts as or causes Sexual Violence + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Very High Likelihood - Level where Likelihood is Very High + Low Likelihood + Level where Likelihood is Low - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Identity Dispute - Identity Dispute - - 2022-08-24 + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.99,xsd:decimal - 2022-08-17 + + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Industrial Crisis - Industrial Crisis - - - 2022-08-17 + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Misuse - Misuse - - 2024-06-11 + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + + 2022-08-18 accepted - Delaram Golpayegani + Harshvardhan J. Pandit - + - + - - Law Enforcement Adverse Effects - Law Enforcement Adverse Effects - - + + Copyright Violation + Something that acts as or causes Copyright Violation + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - + + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - Consequence Control - Risk Mitigation Measure that controls the Consequences + Recovery Control + Control to recover from event 2024-05-19 accepted - Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Detriment + Something that acts as or causes Detriment + + 2022-03-23 + 2024-08-16 + accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + + + + + + + + Societal Health & Safety + + accepted + + + + - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - 0.12,xsd:decimal + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Increase Internal Cost - Increase Internal Cost - - + + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Damage - Impact that acts as or causes damages - - 2022-03-30 + + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.18,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - - - 2024-02-14 + + + Source Control + Risk Mitigation Measure that controls the Source + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Violation of Ethical Code - Violation of Ethical Code - - + + Cryptojacking + Something that acts as or causes Cryptojacking + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - - Cost of Acquisition - Cost of Acquisition - - + + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Theft of Media - Theft of Media - - + + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Primer for Data Privacy Vocabulary - - + - + - - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Material Damage - Impact that acts as or causes material damages - - 2022-03-30 + + Component Malfunction + Something that acts as or causes Component Malfunction + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - - 2024-05-19 + + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + accepted - Harshvardhan J. Pandit - + - + - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - + - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - - 2024-02-14 + + + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.02,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Unauthorised Code Disclosure - Unauthorised Code Disclosure - - + + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Monitor Control - Risk Mitigation Measure that uses controls to monitor events - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - 2024-05-19 + + Risk Matrix 5x5 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.12,xsd:decimal + + Lose of Reputation + Something that acts as or causes Loss of Reputation + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Financial Equipment Costs - Financial Equipment Costs - - - 2022-08-17 + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Service Interruption - Service Interruption - - + + Data Breach + Something that acts as or causes Data Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit + + - + - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - 0.12,xsd:decimal + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Low Risk - Level where Risk is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + + + + + + + Risk Concepts - Turtle serialiation - + - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.36,xsd:decimal + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.71,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Containment Control - Control to contain event - - 2024-05-19 - accepted - - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html - + - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - 0.61,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low 2022-08-18 accepted @@ -848,438 +842,453 @@ - + - Threat - Risk source event which causes Risk - - - 2024-02-14 + + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Loss of Goods - Loss of Goods - - - 2022-08-17 + + Impact Control + Risk Mitigation Measure that controls Impacts + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - - 2024-05-19 + + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - Extremely High Severity - Level where Severity is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.33,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - + - has incident - Indicates an incident is associated with the specified context - - - 2024-02-14 + + + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.32,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - - 2024-02-14 - accepted + + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - - Theft - Theft - - + + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Limitation of Rights - Limitation of Rights - - 2022-08-18 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - + - - Violation of Rights - Violation of Rights - + + Moderate Risk + Level where Risk is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 2022-08-18 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - 0.06,xsd:decimal + 0.49,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Change Consequence - Control that changes Consequence - - 2024-05-19 - accepted + + Intercept Communications + Something that acts as or causes Interception of Communications + + This concept was called "InterceptionCommunications" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - - 0.16,xsd:decimal + + Public Order Breach + Something that acts as or causes Public Order Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Financial Loss - Financial Loss - - - 2022-08-17 + + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Copyright Violation - Copyright Violation - - + + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - - Fraud - Fraud - - + + Security Breach + Something that acts as or causes Security Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Loss of Customer Confidence - Loss of Customer Confidence - - + + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + - + - - Extremely Low Likelihood - Level where Likelihood is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Unauthorised Code Access - Unauthorised Code Access - - + + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Confidentiality Breach - Confidentiality Breach - - - 2022-08-17 + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Environmental Safety Endangerment - Environmental Safety Endangerment - - - 2022-08-17 + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + + 2024-05-19 + accepted + + + + + + + + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - + - Risk Analysis - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - - - 2022-08-18 + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Loss of Proprietary Information - Loss of Proprietary Information - - - 2022-08-17 + + Moderate Likelihood + Level where Likelihood is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Business Performance Impairment - Business Performance Impairment - - - 2022-08-17 + + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Loss of Trust - Loss of Trust - - + + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Very High Severity - Level where Severity is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + Damage + Something that acts as or causes Damage + + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - has control - Indicates the use of specified control - - + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + 2024-02-14 accepted - + - - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + Confidentiality Incident + Incident where the confidentiality of information or system has been affected + + + 2024-05-19 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Loss of Data - Loss of Data - - - 2022-08-17 + + Moderate Severity + Level where Severity is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Remote Spying - Remote Spying - - + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit @@ -1298,2434 +1307,1391 @@ - + - - Violation of Contractual Obligations - Violation of Contractual Obligations - - + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Illegal Processing of Data - Illegal Processing of Data - - + + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Unauthorised System Modification - Unauthorised System Modification - - + + Erroneous System Use + Something that acts as or causes Erroneous System Use + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Unauthorised Code Modification - Unauthorised Code Modification - - - 2022-08-17 + Incident Status + Status associated with an incident + + + 2024-02-14 accepted Harshvardhan J. Pandit + - + - - - - Threat Source - Source of threat event, including both agent and non-agent sources - - 2024-02-14 - accepted - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - Malicious Code Attack - Intentional use of software by including or inserting in a system for a harmful purpose - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unauthorised Data Disclosure - Unauthorised Data Disclosure - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Psychological Harm - Psychological Harm - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Cyber Spying - Cyber Spying - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - - - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - - 2024-02-14 - accepted - - - - - - - - Internal Operation Disruption - Internal Operation Disruption - - - 2022-08-17 + + Change Impact + Control that changes Impact + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - Physical Assault - Physical Assault - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - + Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + + 2024-02-14 + 2024-08-16 accepted - - - - - - - Loss of Assets - Loss of Assets - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Loss of Credibility - Loss of Credibility - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + - + - - Compromise Account - Compromise Account - - + + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - - - - - - - - Detriment - Impact that acts as or causes detriments - - 2022-03-23 - accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - - - - - - - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Remove Source + Control that removes the risk source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Cost of Judicial Proceedings - Cost of Judicial Proceedings - - - 2022-08-17 + + Identification Control + Control to identify characteristics of event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Personnel Absence - Personnel Absence - - + + Malware Attack + Something that acts as or causes Malware Attack + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - Incident Status - Status associated with an incident - - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - + - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.60,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Extremely Low Risk - Level where Risk is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + + + + + Examples for Data Privacy Vocabulary + + - + - - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.31,xsd:decimal - 2022-08-17 + + Reduce Severity + Control that reduces the severity of an event + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Incident Ongoing - The incident is ongoing i.e. still active - + Threat + Risk source event which causes Risk + + 2024-02-14 accepted - Harshvardhan J. Pandit - - - - - - - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - High Risk (RM7x7 S:4 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.41,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Data Breach - Data Breach - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - - - Re-identification - Re-identification - - 2022-08-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Distributed Denial of Service Attack (DDoS) - Distributed Denial of Service Attack (DDoS) - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Compensation - Compensation provided (as an impact) - - 2024-04-14 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - - - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - - 0.49,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unauthorised Data Modification - Unauthorised Data Modification - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unknown Vulnerability Exploited - Unknown Vulnerability Exploited - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.10,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Unauthorised System Access - Unauthorised System Access - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM7x7 S:2 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Source Control - Risk Mitigation Measure that controls the Source - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Moderate Likelihood - Level where Likelihood is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - Incident Impact Assessment - An impact assessment associated with a incident - - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Detection Control - Control to detect event - - 2024-05-19 - accepted - - - - - - - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - - - - System Intrusion - System Intrusion - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Identification Control - Control to identify characteristics of event - - 2024-05-19 - accepted - - - - - - - - Human Errors - Human Errors - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Cyber Stalking - Cyber Stalking - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Monitor Impact - Control that monitors a Risk Impact - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Extorsion - Extorsion - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Sexual Violence - Sexual Violence - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.18,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Compromise Account Credentials - Compromise Account Credentials - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Danger to Personnel - Danger to Personnel - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 - accepted - - - - - - - - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - - 0.33,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - - - 2024-05-19 - accepted - - - - - - - - Remuneration - Renumeration provided as compensation (as an impact) - - 2024-04-14 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - - - Loss of Competitive Advantage - Loss of Competitive Advantage - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Financial Investigation Costs - Financial Investigation Costs - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Economic Disadvantage - Economic Disadvantage - - 2022-08-19 - accepted - Georg P. Krog - - - - - - - - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.86,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Attack on Private Life - Attack on Private Life - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - Incident Identifier - Identifier associated with an incident - - 2024-05-19 - accepted - - - - - - - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - 2024-02-14 - accepted - - - - - - - - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - - 0.14,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unauthorised Access to Premises - Unauthorised Access to Premises - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Personal Safety Endangerment - Personal Safety Endangerment - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Unwanted Code Deletion - Unwanted Code Deletion - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - 2024-05-19 - accepted - - - - - - - - - - Risk Concepts - RDF/XML serialiation - - - - - - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - - 0.14,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Benefit - Impact(s) that acts as or causes benefits - - 2022-03-23 - accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - - - - - - - - Moderate Risk - Level where Risk is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - Physical Spying - Physical Spying - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Spoofing - Spoofing - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Very Low Likelihood - Level where Likelihood is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Rob Brennan - Beatriz Esteves - Fajar Ekaputra - Julian Flake - Georg P. Krog - Delaram Golpayegani - Axel Polleres - Julio Fernandez - Harshvardhan J. Pandit - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - - - - - Authorisation Failure - Authorisation Failure - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Financial Repair Costs - Financial Repair Costs - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 - accepted - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Denial of Service Attack (DoS) - Denial of Service Attack (DoS) - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Equipment Failure - Equipment Failure - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Impact on Data Subject - Impact on Data Subject - - 2022-10-22 - accepted - Harshvardhan J. Pandit, Georg P. Krog - - - - - - - - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - - - - - High Risk - Level where Risk is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - + + Very High Likelihood + Level where Likelihood is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.08,xsd:decimal - 2022-08-17 + Risk Control + Control that modifies risk + + + 2024-05-19 accepted - Harshvardhan J. Pandit + - + - + - - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - 0.10,xsd:decimal + + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Cost of Configuration - Cost of Configuration - - + + Injury + Something that acts as or causes Injury + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Violation of Statutory Obligations - Violation of Statutory Obligations - - + + Authorisation Failure + Something that acts as or causes Authorisation Failure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Retrieval of Discarded Equipment - Retrieval of Discarded Equipment - - + + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Loss of Resources - Loss of Resources - - + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Harshvardhan J. Pandit + Georg P. Krog + Rob Brennan + Beatriz Esteves + Axel Polleres + Fajar Ekaputra + Delaram Golpayegani + Julian Flake + Julio Fernandez + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + - - Low Likelihood - Level where Likelihood is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights + + This concept was called "PreventExercisingOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Retrieval of Deleted Data - Retrieval of Deleted Data - - + + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit + + + + + + + User Risks + Concepts associated with risks that arise due to User or Human use + + accepted + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.40,xsd:decimal + + Extorsion + Something that acts as or causes Extorsion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:3 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.67,xsd:decimal + + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - + + Containment Control + Control to contain event + 2024-05-19 accepted - + - + + - - - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + has control + Indicates the use of specified control + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Threat Source + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + accepted + + - + - - Public Order Breach - Public Order Breach - - + + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Reduce Likelihood - Control that reduces the likelihood of an event - + Monitor Risk + Control that monitors a Risk + 2024-05-19 accepted Harshvardhan J. Pandit - + - Very High Risk - Level where Risk is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - - System Failure - System Failure - - + + Lose of Credibility + Something that acts as or causes Loss of Credibility + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + - - Loss of Control over Data - Loss of Control over Data - - 2022-08-19 + Incident Notice + Notice associated with an Incident + + + 2024-05-19 accepted - Georg P. Krog, Harshvardhan J. Pandit - + - + - - Monitor Risk Source - Control that monitors a Risk Source - - 2024-05-19 + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Environmental Incident - Incident caused due to environmental factors outside human controls - - + + Change Consequence + Control that changes Consequence + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - Risk Source - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - - 2024-02-14 + + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 0.16,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + - - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.37,xsd:decimal + + Spoofing + Something that acts as or causes Spoofing + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Detriment to Recovery - Detriment to Recovery - - + + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Unwanted Data Deletion - Unwanted Data Deletion - - + + Low Risk (RM7x7 S:2 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - High Likelihood - Level where Likelihood is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + Availability Incident + Incident where the availability of information or system has been affected + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 + + Detection Control + Control to detect event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Moderate Risk (RM3x3 S:3 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.33,xsd:decimal + + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Impact Control - Risk Mitigation Measure that controls Impacts - - 2024-05-19 + + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - 0.43,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Corruption of Data - Corruption of Data - - + + Psychological Harm + Something that acts as or causes Psychological Harm + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Business disruption - Business disruption - - + + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.49,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Government Crisis - Government Crisis - - + + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - 0.04,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Security Breach - Security Breach - - + + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + High Risk (RM7x7 S:4 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.41,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Loss of Opportunity - Loss of Opportunity - - + + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - - 2024-05-19 + + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.67,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Non-Material Damage - Impact that acts as or causes non-material damages - - 2022-03-30 + + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + Guides for Data Privacy Vocabulary + + - + - - Loss of Funds - Loss of Funds - - + + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Equipment Malfunction - Equipment Malfunction - - - 2022-08-17 + + Privacy + accepted - Harshvardhan J. Pandit - - + - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - - 2024-02-14 + + + Vulnerability Created + Something that acts as or causes Vulnerability Created + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + 2024-05-19 accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + accepted + + - + - - Monitor Consequence - Control that monitors a Risk Consequence - - 2024-05-19 + + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.51,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - 0.16,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Brute Force Authorisations - Brute Force Authorisations - - + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Change Impact - Control that changes Impact - - 2024-05-19 + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 accepted - Harshvardhan J. Pandit - + + + + + + + + + Risk Concepts - RDF/XML serialiation + + + - + - - Vandalism - Vandalism - - + + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.41,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Vulnerability Exploited - Vulnerability Exploited - - + + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - 0.32,xsd:decimal + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Child Violence - Child Violence - - - 2022-08-17 + + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - - Consequence for Data Subject - Consequence for Data Subject - - 2022-10-22 + + accepted - Harshvardhan J. Pandit, Georg P. Krog - + - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + + 0.57,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely High Risk - Level where Risk is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - - Citizens impact - Citizens impact - - + + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.57,xsd:decimal + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - - Monitor Risk - Control that monitors a Risk - - 2024-05-19 + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Unauthorised Information Disclosure - Unauthorised Information Disclosure - - + + System Failure + Something that acts as or causes System Failure + + Here system refers to both hardware and software systems + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - - 2024-02-14 + + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.08,xsd:decimal + + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - 0.31,xsd:decimal + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + 2024-05-19 + accepted + Harshvardhan J. Pandit + + - + - - Cost of Operation Interruption - Cost of Operation Interruption - - + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Confidentiality Incident - Incident where the confidentiality of information or system has been affected - - - 2024-05-19 + + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low - - 2022-08-18 + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal - 2022-08-17 + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.37,xsd:decimal + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Reward - Reward provided as compensation (as an impact) - - 2024-04-14 + + High Severity + Level where Severity is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.04,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit @@ -3735,125 +2701,155 @@ - + System Malfunction - System Malfunction - - + Something that acts as or causes System Malfunction + + Here system refers to both hardware and software systems + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Integrity Incident - Incident where the integrity of information or system has been affected - - - 2024-05-19 + + Discrimination + Something that acts as or causes Discrimination + + 2022-08-19 + 2024-08-16 accepted + Georg P. Krog - + - + + + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - - 0.24,xsd:decimal + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.36,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Reduce Severity - Control that reduces the severity of an event - - 2024-05-19 + + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Injury - Injury - - - 2022-08-17 + + Re-identification + Something that acts as or causes Re-identification + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Remedy Control - Control to remedy consequences of event - + Incident Impact Assessment + An impact assessment associated with a incident + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Cost of Installation - Cost of Installation - - - 2022-08-17 + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 + + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.80,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Equipment Failure + Something that acts as or causes Equipment Failure + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High 0.61,xsd:decimal 2022-08-17 @@ -3862,323 +2858,327 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - - 0.86,xsd:decimal + + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Impact to Rights - Impact to Rights - - - 2022-08-17 + + Low Severity + Level where Severity is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Recovery Control - Control to recover from event - + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + 2024-05-19 accepted + Harshvardhan J. Pandit - + - - Unauthorised Impersonation - Unauthorised Impersonation - - + + Intentional Misuse + Intentional Misuse + + accepted + + + + + + + + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Cost of Backup - Cost of Backup - - + + System Intrusion + Something that acts as or causes System Intrusion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + Physical Harm + + accepted + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + + - - - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 + + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Damage by Third Party - Damage by Third Party - - - 2022-08-17 + + Reduce Likelihood + Control that reduces the likelihood of an event + + 2024-05-19 accepted Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Physical Stalking - Physical Stalking - - + + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Primer for Data Privacy Vocabulary + + - + - - Replacement Costs - Replacement Costs - - - 2022-08-17 + + Reduction Control + Control that reduces the likelihood or severity of an event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - - 0.99,xsd:decimal + + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - - 2022-08-18 + Incident + An actual or occured event + + + + Incident is realised or materialised risk + 2024-02-14 + 2024-05-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - + + - + - - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.02,xsd:decimal - 2022-08-17 + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - - 0.29,xsd:decimal + + Data Corruption + Something that acts as or causes Corruption of Data + + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.08,xsd:decimal + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Halt Source - Control that halts the risk source or prevents it from materialising - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Harmful Speech - Harmful Speech - - + + Identity Fraud + Something that acts as or causes Identity Fraud + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Violation of Regulatory Obligations - Violation of Regulatory Obligations - - + + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit @@ -4187,736 +3187,779 @@ - + Fee - Fee provided as compensation (as an impact) - + Something that acts as or provides fees e.g. for using a service + DGA 2.10 2024-04-14 - accepted + 2024-08-16 + modified Georg P. Krog, Harshvardhan J. Pandit - + + + + + + + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + 0.43,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.51,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Stalking - Stalking - - + + Coercion + Something that acts as or causes Coercion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.48,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Avoid Source - Control that avoids the risk source - + Consequence Control + Risk Mitigation Measure that controls the Consequences + 2024-05-19 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.04,xsd:decimal + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 + + + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted - + Harshvardhan J. Pandit - + - + - Vulnerability - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - 2024-02-14 + + Low Risk + Level where Risk is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Loss of Reputation - Loss of Reputation - - + + Scam + Something that acts as or causes Scam + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + Remove Impact + Control that removes Impact i.e. prevents it from materialising + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.73,xsd:decimal + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Phishing Scam - A type of social engineering attack involving deceptive messages intended to reveal sensitive information - - - 2022-08-17 + + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + + 2024-02-14 + accepted + + - + - High Risk (RM7x7 S:5 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - 0.41,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Risk Matrix 5x5 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + 2024-02-14 accepted - Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Misinformation and Disinformation - Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) - - + + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - - 2024-02-14 + + Integrity Incident + Incident where the integrity of information or system has been affected + + + 2024-05-19 accepted - + - + - - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - - 2024-02-14 + + Terrorism + Something that acts as or causes Terrorism + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - - Third Party Operation Disruption - Third Party Operation Disruption - - + + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Business impact - Business impact - - + + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + - - - Privacy impact - Privacy impact - - - 2022-08-17 + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.29,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - - Prevent Exercising of Rights - Prevent Exercising of Rights - - 2022-08-18 + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + + 2024-02-14 accepted - Georg P. Krog, Harshvardhan J. Pandit - + - + - - Compliance impact - Compliance impact - - + + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Availability Incident - Incident where the availability of information or system has been affected - - - 2024-05-19 + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals accepted - + - + - - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - - 2022-08-17 + + Component Failure + Something that acts as or causes Component Failure + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - + - - Extremely Low Severity - Level where Severity is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.49,xsd:decimal - 2022-08-17 + + Misuse + Something that acts as or causes Misuse + + 2024-06-11 + 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - + - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + - - - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.44,xsd:decimal - 2022-08-17 + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit + - - - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - - - - - Risk Concepts - N3 serialiation + - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Spam - Spam - - - 2022-08-17 + + Extremely Low Severity + Level where Severity is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Risk Control - Control that modifies risk - - - 2024-05-19 + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - + - - Known Vulnerability Exploited - Known Vulnerability Exploited - - - 2022-08-17 + + Monitor Risk Source + Control that monitors a Risk Source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Harm - Impact that acts as or causes harms - - 2022-08-13 + + Benefit + Something that acts as or causes benefits + + 2022-03-23 + 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - 0.80,xsd:decimal + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Blackmail - Blackmail - - - 2022-08-17 + + High Risk + Level where Risk is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Unauthorised Data Access - Unauthorised Data Access - - + + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit + + + + + + + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 + 2022-08-18 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Monitor Consequence + Control that monitors a Risk Consequence + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + - + - - Coercion - Coercion - - - 2022-08-17 + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal - 2022-08-17 + + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.48,xsd:decimal + Very Low Risk (RM7x7 S:6 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - - 2024-05-19 - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Incident - An actual or occured event + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - Incident is realised or materialised risk 2024-02-14 - 2024-05-19 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Incident Detection Report - A report describing the detection of a Incident - - - 2024-05-19 + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - + - + - - Vulnerability Created - Vulnerability Created - - - 2022-08-17 + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - - Loss of Suppliers - Loss of Suppliers - - + + Lose of Trust + Something that acts as or causes Loss of Trust + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - Discrimination - Discrimination - - 2022-08-19 + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 accepted - Georg P. Krog + Georg P. Krog, Harshvardhan J. Pandit - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + + 2024-05-19 accepted - - - - - Violation of Code of Conduct - Violation of Code of Conduct - - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" + Incident Status Unknown + The status of a incident is unknown 2024-02-14 accepted @@ -4924,574 +3967,563 @@ - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - - 2024-05-19 + + Extremely High Risk + Level where Risk is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - 0.57,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + - - Cryptojacking - Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency - - - 2022-08-17 + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Reputation and trust impact - Reputation and trust impact - - - 2022-08-17 + + Internal Security Threat + Concepts associated with security threats and issues that originate within the organisation + accepted - Harshvardhan J. Pandit - + - - Payment - Payment provided as compensation (as an impact) - - 2024-04-14 + + Individual Health & Safety + accepted - Georg P. Krog, Harshvardhan J. Pandit - + - - Sabotage - Sabotage - - - 2022-08-17 + + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + - - Social Disadvantage - Social Disadvantage - - 2022-08-19 + + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - - Erroneous System Use - Erroneous System Use - - - 2022-08-17 + + Very High Severity + Level where Severity is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Scam - Scam - - + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - Examples for Data Privacy Vocabulary - - - - + - - Very Low Risk - Level where Risk is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + Remedy Control + Control to remedy consequences of event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Organisation Disruption - Organisation Disruption - - + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Cost of Suspended Operations - Cost of Suspended Operations - - - 2022-08-17 + + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Reduction Control - Control that reduces the likelihood or severity of an event - + Monitor Impact + Control that monitors a Risk Impact + 2024-05-19 accepted + Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - - 2024-05-19 + + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.08,xsd:decimal + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Spying - Spying - - - 2022-08-17 + + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 + 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Danger to Customers - Danger to Customers - - + + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.32,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Compromise Account Security - Compromise Account Security - - - 2022-08-17 + + Very Low Likelihood + Level where Likelihood is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Health and life impact - Health and life impact - - + + Sabotage + Something that acts as or causes Sabotage + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - + + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Loss of Goodwill - Loss of Goodwill - - - 2022-08-17 + + Accidental Misuse + Accidental Misuse + accepted - Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.24,xsd:decimal + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Loss of Negotiating Capacity - Loss of Negotiating Capacity - - + + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Unwanted Disclosure of Data - Unwanted Disclosure of Data - - + + Moderate Risk (RM3x3 S:3 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - - 2022-08-18 + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Terrorism - Terrorism - - + + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - + - - Abusive Content Utilisation - Abusive Content Utilisation - - - 2022-08-17 + + Halt Source + Control that halts the risk source or prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - + - - - - - - - Risk Concepts - HTML serialiation + + + + + Extremely Low Likelihood + Level where Likelihood is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + 0.57,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - - Remove Impact - Control that removes Impact i.e. prevents it from materialising - + + Operational Security Risk + Risks and issues that arise during operational processes + + accepted + + + + + + + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Malware Attack - Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system - - + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Extremely High Severity + Level where Severity is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 + + + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence 2024-05-19 @@ -5499,108 +4531,65 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Remove Source - Control that removes the risk source - - 2024-05-19 + + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + + 0.43,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + - - Theft of Equipment - Theft of Equipment - - + + Identity Theft + Something that acts as or causes Identity Theft + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - @@ -5609,191 +4598,186 @@ Risk Concepts - JSON-LD serialiation - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Guides for Data Privacy Vocabulary - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ENISA Threat Taxonomy 2016 https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + + 2024-05-19 + accepted + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + Incident Identifier + Identifier associated with an incident + + 2024-05-19 + accepted + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + Incident Detection Report + A report describing the detection of a Incident + + + 2024-05-19 + accepted + + + + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + + + + + + + Risk Concepts - N3 serialiation + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + + accepted + + + + + + + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment diff --git a/2.1-dev/risk/risk.ttl b/2.1-dev/risk/risk.ttl index 1205451dd..2c375f60a 100644 --- a/2.1-dev/risk/risk.ttl +++ b/2.1-dev/risk/risk.ttl @@ -124,21 +124,6 @@ risk:7SeverityLevels a rdfs:Class, skos:inScheme risk:risk-levels-classes ; skos:prefLabel "7 Severity Levels"@en . -risk:AbusiveContentUtilisation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Abusive Content Utilisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Abusive Content Utilisation"@en . - risk:AccidentalIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -150,36 +135,40 @@ risk:AccidentalIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Accidental Incident"@en . -risk:AttackonPrivateLife a rdfs:Class, +risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Attack on Private Life"@en ; + skos:broader risk:UserRisks ; + skos:definition "Accidental Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Attack on Private Life"@en . + skos:prefLabel "Accidental Misuse"@en . risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Authorisation Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . +risk:AvailabilityBreach a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . + risk:AvailabilityIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -205,91 +194,49 @@ risk:AvoidSource a rdfs:Class, risk:Benefit a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact ; - skos:definition "Impact(s) that acts as or causes benefits"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes benefits"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Benefit"@en . risk:Blackmail a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Blackmail"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Brute Force Authorisations"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . -risk:BusinessImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Business impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business impact"@en . - -risk:BusinessPerformanceImpairment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business Performance Impairment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business Performance Impairment"@en . - -risk:Businessdisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Business disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Business disruption"@en . - risk:ChangeConsequence a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -314,135 +261,102 @@ risk:ChangeImpact a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Change Impact"@en . -risk:ChildViolence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Child Violence"@en . - -risk:CitizensImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Citizens impact"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Citizens impact"@en . - risk:Coercion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Coercion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . risk:Compensation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Benefit ; - skos:definition "Compensation provided (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compensation"@en . -risk:ComplianceImpact a rdfs:Class, +risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Compliance impact"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compliance impact"@en . + skos:prefLabel "Component Failure"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . -risk:CompromiseAccount a rdfs:Class, +risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account"@en . + skos:prefLabel "Component Malfunction"@en ; + skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . -risk:CompromiseAccountCredentials a rdfs:Class, +risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Compromise Account Credentials"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Credentials"@en . + skos:prefLabel "Compromise Account"@en . -risk:CompromiseAccountSecurity a rdfs:Class, +risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Compromise Account Security"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Compromise Account Security"@en . + skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Confidentiality Breach"@en ; + skos:broader risk:DataBreach ; + skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -469,30 +383,6 @@ risk:ConsequenceControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Consequence Control"@en . -risk:ConsequenceForDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence for Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence for Data Subject"@en . - -risk:ConsequenceOnDataSecurity a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Consequence on Data Security"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Consequence on Data Security"@en . - risk:ContainmentControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -506,154 +396,20 @@ risk:ContainmentControl a rdfs:Class, risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Copyright Violation"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Copyright Violation"@en . -risk:CorruptionData a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Corruption of Data"@en . - -risk:CostAcquisition a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Acquisition"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Acquisition"@en . - -risk:CostBackup a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Backup"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Backup"@en . - -risk:CostConfiguration a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Configuration"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Configuration"@en . - -risk:CostInstallation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Installation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Installation"@en . - -risk:CostJudicialPenalties a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Penalties"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Penalties"@en . - -risk:CostJudicialProceedings a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Judicial Proceedings"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Judicial Proceedings"@en . - -risk:CostOperationInterruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Operation Interruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Operation Interruption"@en . - -risk:CostSuspendedOperations a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cost of Suspended Operations"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cost of Suspended Operations"@en . - risk:CrossBorderIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -667,122 +423,67 @@ risk:CrossBorderIncident a rdfs:Class, risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . -risk:CyberSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Spying"@en . - -risk:CyberStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Cyber Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Cyber Stalking"@en . - risk:Damage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Damage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Damage"@en . -risk:DamageByThirdParty a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Damage by Third Party"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Damage by Third Party"@en . - -risk:DangertoCustomers a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Customers"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Customers"@en . - -risk:DangertoPersonnel a rdfs:Class, +risk:DataBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; + vann:example dex:E0069, + dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Danger to Personnel"@en ; + skos:broader risk:SecurityBreach ; + skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Danger to Personnel"@en . + skos:prefLabel "Data Breach"@en . -risk:DataBreach a rdfs:Class, +risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; - vann:example dex:E0069, - dex:E0071 ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Data Breach"@en ; + sw:term_status "modified"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Data Breach"@en . + skos:prefLabel "Data Corruption"@en ; + skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk:DeliberateIncident a rdfs:Class, skos:Concept ; @@ -797,16 +498,20 @@ risk:DeliberateIncident a rdfs:Class, risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Denial of Service Attack (DoS)"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -823,84 +528,45 @@ risk:DetectionControl a rdfs:Class, risk:Detriment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact that acts as or causes detriments"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Detriment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Detriment"@en . -risk:DetrimentToRecovery a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Detriment to Recovery"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Detriment to Recovery"@en . - risk:Discrimination a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Discrimination"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Discrimination"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Distributed Denial of Service Attack (DDoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . - -risk:Eavesdropping a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Eavesdropping"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Eavesdropping"@en . - -risk:EconomicDisadvantage a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Economic Disadvantage"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Economic Disadvantage"@en . + skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk:EnvironmentalIncident a rdfs:Class, skos:Concept ; @@ -913,78 +579,106 @@ risk:EnvironmentalIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Environmental Incident"@en . -risk:EnvironmentalSafetyEndangerment a rdfs:Class, +risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Environmental Safety Endangerment"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Environmental Safety Endangerment"@en . + skos:prefLabel "Environmental Risk"@en . risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Equipment Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Failure"@en . + skos:prefLabel "Equipment Failure"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Equipment Malfunction"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Equipment Malfunction"@en . + skos:prefLabel "Equipment Malfunction"@en ; + skos:scopeNote "Here equipment refers to physical equipment"@en . risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Erroneous System Use"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Erroneous System Use"@en . +risk:ExposureToHarmfulSpeech a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Exposure to Harmful Speech"@en ; + skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . + +risk:ExternalSecurityThreat a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "External Security Threat"@en . + risk:Extorsion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Extorsion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -1074,122 +768,60 @@ risk:ExtremelyLowSeverity a rdfs:Class, risk:Fee a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source "DGA 2.10"@en ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Fee provided as compensation (as an impact)"@en ; + sw:term_status "modified"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fee"@en . -risk:FinancialEquipmentCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Equipment Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Equipment Costs"@en . - -risk:FinancialInvestigationCosts a rdfs:Class, +risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Investigation Costs"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Investigation Costs"@en . + skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Financial Loss"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Financial Loss"@en . -risk:FinancialPersonnelCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Personnel Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Personnel Costs"@en . - -risk:FinancialRepairCosts a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Financial Repair Costs"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Financial Repair Costs"@en . - risk:Fraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Fraud"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . -risk:GovernmentCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Government Crisis"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Government Crisis"@en . - risk:HaltSource a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -1204,45 +836,17 @@ risk:HaltSource a rdfs:Class, risk:Harm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes harms"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harm"@en . - -risk:HarmfulSpeech a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Harmful Speech"@en . - -risk:HealthLifeImpact a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Health and life impact"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Harm to humans"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Health and life impact"@en . + skos:prefLabel "Harm"@en ; + skos:scopeNote "This concept refers to the general abstract notion of harm"@en . risk:HighLikelihood a rdfs:Class, skos:Concept, @@ -1294,16 +898,17 @@ risk:HighSeverity a rdfs:Class, risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Human Errors"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Human Errors"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Human Errors"@en . @@ -1318,62 +923,54 @@ risk:IdentificationControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Identification Control"@en . -risk:IdentityDispute a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-24"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Identity Dispute"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Identity Dispute"@en . - risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Fraud"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Identity Theft"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . -risk:IllegalProcessingData a rdfs:Class, +risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Illegal Processing of Data"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Illegal Processing of Data"@en . + skos:prefLabel "Illegal Data Processing"@en ; + skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . risk:ImpactControl a rdfs:Class, skos:Concept, @@ -1387,43 +984,19 @@ risk:ImpactControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Impact Control"@en . -risk:ImpactOnDataSubject a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit, Georg P. Krog" ; - dct:created "2022-10-22"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact on Data Subject"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact on Data Subject"@en . - -risk:ImpactToRights a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Impact to Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Impact to Rights"@en . - risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; dct:created "2024-02-14"^^xsd:date, "2024-05-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; vann:example dex:E0069, dex:E0070 ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf rdfs:Class, + dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "An actual or occured event"@en ; skos:inScheme risk:core-classes, risk:incident-classes ; @@ -1683,51 +1256,47 @@ risk:IncidentTerminated a rdfs:Class, skos:inScheme risk:incident-status-classes ; skos:prefLabel "Incident Terminated"@en . -risk:IncreaseInternalCost a rdfs:Class, +risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Increase Internal Cost"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Increase Internal Cost"@en . + skos:prefLabel "Individual Health & Safety"@en . -risk:IndustrialCrisis a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; +risk:IndividualRisk a rdfs:Class, + skos:Concept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Industrial Crisis"@en ; + skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Industrial Crisis"@en . + skos:prefLabel "Individual Risk"@en . risk:Injury a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Injury"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Injury"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Injury"@en . +risk:IntegrityBreach a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-consequences-classes . + risk:IntegrityIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -1739,344 +1308,184 @@ risk:IntegrityIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Integrity Incident"@en . -risk:InterceptionCommunications a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Interception of Communications"@en . - -risk:InternalOperationDisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Internal Operation Disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Operation Disruption"@en . - -risk:KnownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Known Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Known Vulnerability Exploited"@en . - -risk:LawEnforcementAdverseEffects a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Law Enforcement Adverse Effects"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Law Enforcement Adverse Effects"@en . - -risk:LimitationOfRights a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Limitation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Limitation of Rights"@en . - -risk:LossAssets a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Assets"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Assets"@en . - -risk:LossCompetitiveAdvantage a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Competitive Advantage"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Competitive Advantage"@en . - -risk:LossControlOverData a rdfs:Class, +risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Control over Data"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Control over Data"@en . - -risk:LossCredibility a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Credibility"@en . - -risk:LossCustomerConfidence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Customer Confidence"@en ; + skos:broader risk:UserRisks ; + skos:definition "Intentional Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customer Confidence"@en . + skos:prefLabel "Intentional Misuse"@en . -risk:LossCustomers a rdfs:Class, +risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Customers"@en ; + sw:term_status "modified"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Customers"@en . + skos:prefLabel "Intercept Communications"@en ; + skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:LossData a rdfs:Class, +risk:InternalSecurityThreat a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Data"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Data"@en . + skos:prefLabel "Internal Security Threat"@en . -risk:LossFunds a rdfs:Class, +risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Funds"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Funds"@en . + skos:prefLabel "Judicial Costs"@en . -risk:LossGoods a rdfs:Class, +risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Loss of Goods"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goods"@en . + skos:prefLabel "Judicial Penalty"@en . -risk:LossGoodwill a rdfs:Class, +risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Goodwill"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Goodwill"@en . + skos:prefLabel "Legal Risk"@en . -risk:LossNegotiatingCapacity a rdfs:Class, +risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Negotiating Capacity"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Credibility"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Negotiating Capacity"@en . + skos:prefLabel "Lose of Credibility"@en . -risk:LossOpportunity a rdfs:Class, +risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Opportunity"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Opportunity"@en . + skos:prefLabel "Lose of Customer Confidence"@en . -risk:LossProprietaryInformation a rdfs:Class, +risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Proprietary Information"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Goodwill"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Proprietary Information"@en . + skos:prefLabel "Lose of Goodwill"@en . -risk:LossReputation a rdfs:Class, +risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Reputation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Reputation"@en . - -risk:LossResources a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Resources"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Resources"@en . + skos:prefLabel "Lose of Negotiating Capacity"@en . -risk:LossSuppliers a rdfs:Class, +risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Suppliers"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Opportunity"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Suppliers"@en . + skos:prefLabel "Lose of Opportunity"@en . -risk:LossTechnologicalAdvantage a rdfs:Class, +risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Loss of Technological Advantage"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Reputation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Technological Advantage"@en . + skos:prefLabel "Lose of Reputation"@en . -risk:LossTrust a rdfs:Class, +risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Loss of Trust"@en ; + skos:broader risk:ReputationalRisk ; + skos:definition "Something that acts as or causes Loss of Trust"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Loss of Trust"@en . + skos:prefLabel "Lose of Trust"@en . risk:LowLikelihood a rdfs:Class, skos:Concept, @@ -2128,88 +1537,63 @@ risk:LowSeverity a rdfs:Class, risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Intentional use of software by including or inserting in a system for a harmful purpose"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-03-30"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes material damages"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Material Damage"@en . - -risk:MisinformationDisinformation a rdfs:Class, - skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape 2021" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; + dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misinformation and Disinformation"@en . + skos:prefLabel "Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk:Misuse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Misuse"@en ; + skos:broader risk:UserRisks ; + skos:definition "Something that acts as or causes Misuse"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Misuse"@en . -risk:MisuseBreachedInformation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Misuse of Breached Information"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Misuse of Breached Information"@en . - risk:ModerateLikelihood a rdfs:Class, skos:Concept, dpv:Likelihood ; @@ -2345,187 +1729,136 @@ risk:MonitorVulnerabilities a rdfs:Class, risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Impact that acts as or causes non-material damages"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Non-Material Damage"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Non-Material Damage"@en . + skos:prefLabel "Non-Material Damage"@en ; + skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . -risk:OrganisationDisruption a rdfs:Class, +risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Organisation Disruption"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Organisation Disruption"@en . + skos:prefLabel "Operational Security Risk"@en . risk:Payment a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Payment provided as compensation (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Personal Safety Endangerment"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Personal Safety Endangerment"@en . -risk:PersonnelAbsence a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Personnel Absence"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Personnel Absence"@en . - risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "A type of social engineering attack involving deceptive messages intended to reveal sensitive information"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Physical Assault"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Physical Assault"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Physical Assault"@en . -risk:PhysicalSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Spying"@en . - -risk:PhysicalStalking a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Physical Stalking"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Physical Stalking"@en . - -risk:PreventExercisingOfRights a rdfs:Class, +risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Prevent Exercising of Rights"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en . + skos:prefLabel "Physical Harm"@en . -risk:PrivacyImpact a rdfs:Class, +risk:Privacy a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Privacy impact"@en ; + skos:broader risk:IndividualRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Privacy impact"@en . + skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Psychological Harm"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Public Order Breach"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Public Order Breach"@en . @@ -3608,24 +2941,6 @@ risk:RM7x7S7L7 a rdfs:Class, skos:inScheme risk:risk-matrix-classes ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . -risk:RansomwareAttack a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; - schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ], - [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Ransomware Attack"@en . - risk:RecoveryControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3674,15 +2989,17 @@ risk:ReductionControl a rdfs:Class, risk:Reidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Re-identification"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Re-identification"@en . + skos:prefLabel "Re-identification"@en ; + skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . risk:RemedyControl a rdfs:Class, skos:Concept, @@ -3695,21 +3012,6 @@ risk:RemedyControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Remedy Control"@en . -risk:RemoteSpying a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Remote Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Remote Spying"@en . - risk:RemoveConsequence a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3748,87 +3050,99 @@ risk:RemoveSource a rdfs:Class, risk:Renumeration a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Renumeration provided as compensation (as an impact)"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Remuneration"@en . -risk:ReplacementCosts a rdfs:Class, +risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Replacement Costs"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Replacement Costs"@en . + skos:prefLabel "Reputational Risk"@en . -risk:ReputationTrustImpact a rdfs:Class, +risk:Reward a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; - schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2024-04-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Reputation and trust impact"@en ; + skos:broader risk:FinancialImpact ; + skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reputation and trust impact"@en . + skos:prefLabel "Reward"@en . -risk:RetrievalDeletedData a rdfs:Class, +risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Deleted Data"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Deleted Data"@en . + skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . -risk:RetrievalDiscardedEquipment a rdfs:Class, +risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Retrieval of Discarded Equipment"@en ; + skos:broader dpv:Impact, + risk:SocietalRisk ; + skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Retrieval of Discarded Equipment"@en . + skos:prefLabel "Impact to Rights"@en ; + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . -risk:Reward a rdfs:Class, +risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:Impact ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Compensation ; - skos:definition "Reward provided as compensation (as an impact)"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Limitation of Rights"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Reward"@en . + skos:prefLabel "Limitation of Rights"@en ; + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + +risk:RightsViolation a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; + dct:created "2022-08-18"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Violation of Rights"@en ; + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . risk:RiskAnalysis a rdfs:Class, skos:Concept ; @@ -3934,85 +3248,86 @@ risk:RiskMatrix7x7 a rdfs:Class, risk:RiskSource a rdfs:Class, skos:Concept ; dct:created "2024-02-14"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; - rdfs:subClassOf rdfs:Class ; + rdfs:subClassOf dpv:RiskConcept ; sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:inScheme risk:core-classes ; skos:prefLabel "Risk Source"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sabotage"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . risk:Scam a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Scam"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . -risk:SecurityBreach a rdfs:Class, +risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Security Breach"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Security Breach"@en . + skos:prefLabel "Security Attack"@en . -risk:ServiceInterruption a rdfs:Class, +risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Service Interruption"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Service Interruption"@en . + skos:prefLabel "Security Breach"@en . risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Sexual Violence"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sexual Violence"@en . @@ -4030,208 +3345,134 @@ risk:ShareRisk a rdfs:Class, risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Risk ; - skos:definition "Social Disadvantage"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Social Disadvantage"@en . -risk:SourceControl a rdfs:Class, - skos:Concept, - risk:RiskControl ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2024-05-19"^^xsd:date ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RiskControl ; - skos:definition "Risk Mitigation Measure that controls the Source"@en ; - skos:inScheme risk:risk-controls-classes ; - skos:prefLabel "Source Control"@en . - -risk:Spam a rdfs:Class, +risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spam"@en ; + skos:broader risk:SocietalRisk ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spam"@en . + skos:prefLabel "Societal Health & Safety"@en . -risk:Spoofing a rdfs:Class, +risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Spoofing"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spoofing"@en . + skos:prefLabel "Societal Risk"@en . -risk:Spying a rdfs:Class, +risk:SourceControl a rdfs:Class, skos:Concept, - dpv:Risk ; + risk:RiskControl ; dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + dct:created "2024-05-19"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Spying"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Spying"@en . + skos:broader risk:RiskControl ; + skos:definition "Risk Mitigation Measure that controls the Source"@en ; + skos:inScheme risk:risk-controls-classes ; + skos:prefLabel "Source Control"@en . -risk:Stalking a rdfs:Class, +risk:Spoofing a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ], + [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Stalking"@en ; + skos:broader risk:ExternalSecurityThreat, + risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Stalking"@en . + skos:prefLabel "Spoofing"@en . risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Failure"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Failure"@en . + skos:prefLabel "System Failure"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Intrusion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "System Malfunction"@en ; + skos:broader risk:OperationalSecurityRisk ; + skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "System Malfunction"@en . + skos:prefLabel "System Malfunction"@en ; + skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Terrorism"@en ; + skos:broader risk:SocietalRisk ; + skos:definition "Something that acts as or causes Terrorism"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Terrorism"@en . -risk:Theft a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft"@en . - -risk:TheftEquipment a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Equipment"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Equipment"@en . - -risk:TheftMedia a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:MaterialDamage ; - skos:definition "Theft of Media"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Theft of Media"@en . - -risk:ThirdPartyOperationDisruption a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Third Party Operation Disruption"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Third Party Operation Disruption"@en . - risk:Threat a rdfs:Class, skos:Concept ; dct:created "2024-02-14"^^xsd:date ; @@ -4255,270 +3496,260 @@ risk:ThreatSource a rdfs:Class, risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Access to Premises"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . +risk:UnauthorisedActivity a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Unauthorised Activity"@en . + risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Code Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised Code Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Data Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Data Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . -risk:UnauthorisedImpersonation a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:NonMaterialDamage ; - skos:definition "Unauthorised Impersonation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unauthorised Impersonation"@en . - risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Information Disclosure"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Reidentification ; - skos:definition "Unauthorised Re-Identification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised Resource Use"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unauthorised System Access"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unauthorised System Modification"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . -risk:UnknownVulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unknown Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Unknown Vulnerability Exploited"@en . - risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Code Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Unwanted Data Deletion"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Unwanted Disclosure of Data"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . -risk:Vandalism a rdfs:Class, +risk:UserRisks a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Threat Taxonomy 2016" ; - schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Vandalism"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vandalism"@en . + skos:prefLabel "User Risks"@en . risk:VeryHighLikelihood a rdfs:Class, skos:Concept, @@ -4610,92 +3841,117 @@ risk:VeryLowSeverity a rdfs:Class, skos:prefLabel "Very Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1"@en . -risk:ViolationCodeConduct a rdfs:Class, +risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Code of Conduct"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Code of Conduct"@en . + skos:prefLabel "Violating Code of Conduct"@en ; + skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . -risk:ViolationContractualObligations a rdfs:Class, +risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Contractual Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Contractual Obligations"@en . + skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . -risk:ViolationEthicalCode a rdfs:Class, +risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Ethical Code"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Ethical Code"@en . + skos:prefLabel "Violating Ethics Code"@en ; + skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . -risk:ViolationOfRights a rdfs:Class, +risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:Risk ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2022-08-18"^^xsd:date ; + dpv:RiskConcept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; + dct:source [ a schema:WebPage ; + schema:name "ISO/IEC 27005:2018" ; + schema:url "https://www.iso.org/standard/75281.html" ] ; + rdfs:isDefinedBy risk: ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:inScheme risk:risk-consequences-classes ; + skos:prefLabel "Violation of Legal Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . + +risk:ViolatingPolicy a rdfs:Class, + skos:Concept, + dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Harm ; - skos:definition "Violation of Rights"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Rights"@en . + skos:prefLabel "Violating Policy"@en . -risk:ViolationRegulatoryObligations a rdfs:Class, +risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Regulatory Obligations"@en ; + sw:term_status "modified"@en ; + skos:broader risk:LegalRisk ; + skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Regulatory Obligations"@en . + skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . -risk:ViolationStatutoryObligations a rdfs:Class, +risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; + schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; + schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Damage ; - skos:definition "Violation of Statutory Obligations"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Something that acts as or causes Child Violence"@en ; skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en . + skos:prefLabel "Violence against children"@en ; + skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . risk:Vulnerability a rdfs:Class, skos:Concept ; @@ -4709,34 +3965,20 @@ risk:Vulnerability a rdfs:Class, risk:VulnerabilityCreated a rdfs:Class, skos:Concept, - dpv:Risk ; + dpv:RiskConcept ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; + dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Created"@en ; + skos:broader risk:InternalSecurityThreat ; + skos:definition "Something that acts as or causes Vulnerability Created"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Vulnerability Created"@en . -risk:VulnerabilityExploited a rdfs:Class, - skos:Concept, - dpv:Risk ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; - schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Detriment ; - skos:definition "Vulnerability Exploited"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Exploited"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/search.html b/2.1-dev/search.html index 4c0cf8c7f..d80ce0589 100644 --- a/2.1-dev/search.html +++ b/2.1-dev/search.html @@ -107,7 +107,7 @@

    DPV Search Index

    -

    Search through 6922 classes and 196 properties from DPV and its extensions. Concepts are from DPV version 2.1-dev.
    +

    Search through 6872 classes and 196 properties from DPV and its extensions. Concepts are from DPV version 2.1-dev.
    Purl for this page: https://w3id.org/dpv/2.0/search

    @@ -126,7 +126,7 @@

    DPV Search Index