Security Risk Assessment Calculator
Risk Score (Appetite):
0
Likelihood Score:
0
Impact Score:
0
Vector:
(SL:0/M:0/O:0/S:0/ED:0/EE:0/A:0/ID:0/LC:0/LI:0/LAV:0/LAC:0/FD:0/RD:0/NC:0/PV:0)
Copy this hyperlink in your riskticket to be able to revisit this assessment.
Threat Agent Factors
Which threatactors are involved? The goal here is to estimate the likelihood of a successful attack by this specific group of threat agents. Use the worst-case threatagent group.
Skill level
How technically skilled is this group of threat agents?
Motive
How motivated is this group of threat agents to find and exploit this vulnerability?
Opportunity
What resources and opportunities are required for this group of threat agents to find and exploit this vulnerability?
Actorgroupsize
How large is this group of threat agents?
Technical Impact Factors
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.
Loss of Confidentiality
How much data could be disclosed and how sensitive is it?
Loss of Integrity
How much data could be corrupted and how damaged is it?
Loss of Availability
How vital is the service(s) and how much unavailability will take place?
Loss of Accountability
Are the threat agents' actions traceable to a source or individual?
Vulnerability Factors
What is the vulnerability involved? The goal here is to estimate the likelihood of a particular vulnerability involved being discovered and exploited.
Ease of Discovery
How easy is it for this group of threatagents to discover the vulnerability in question?
Ease of Exploit
How easy is it for this group of threat agents to actually exploit this vulnerability?
Awareness
How well known is this vulnerability to this group of threat agents?
Intrusion Detection
How likely is an exploit to be detected?
Business Impact Factors
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.
Financial damage
How much financial damage will result from an exploit?
Reputation damage
Would an exploit result in reputation damage that would harm the organisation and/or stakheolders?
Non-compliance
How much exposure does non-compliance introduce towards laws, regulations and supervisory bodies?
Privacy violation
How much personally identifiable information could be disclosed?
Hint:
-

Created by: Code403
Inspired by: The OWASP Risk Assessment Framework and Javier Olmedo's calculator.