
Security Risk Assessment Calculator
Risk Score (Appetite):
0
Likelihood Score:
0
Impact Score:
0
Vector:
(SL:0/M:0/O:0/S:0/ED:0/EE:0/A:0/ID:0/LC:0/LI:0/LAV:0/LAC:0/FD:0/RD:0/NC:0/PV:0)
Copy this hyperlink in your riskticket to be able to revisit this assessment.
Threat Agent Factors
Which threatactors are involved? The goal here is to estimate the likelihood of a successful attack by this specific group of threat agents. Use the worst-case threatagent group.
Skill level

How technically skilled is this group of threat agents?
Motive

How motivated is this group of threat agents to find and exploit this vulnerability?
Opportunity

What resources and opportunities are required for this group of threat agents to find and exploit this vulnerability?
Actorgroupsize

How large is this group of threat agents?
Technical Impact Factors
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.
Loss of Confidentiality

How much data could be disclosed and how sensitive is it?
Loss of Integrity

How much data could be corrupted and how damaged is it?
Loss of Availability

How vital is the service(s) and how much unavailability will take place?
Loss of Accountability

Are the threat agents' actions traceable to a source or individual?
Vulnerability Factors
What is the vulnerability involved? The goal here is to estimate the likelihood of a particular vulnerability involved being discovered and exploited.
Ease of Discovery

How easy is it for this group of threatagents to discover the vulnerability in question?
Ease of Exploit

How easy is it for this group of threat agents to actually exploit this vulnerability?
Awareness

How well known is this vulnerability to this group of threat agents?
Intrusion Detection

How likely is an exploit to be detected?
Business Impact Factors
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.
Financial damage

How much financial damage will result from an exploit?
Reputation damage

Would an exploit result in reputation damage that would harm the organisation and/or stakheolders?
Non-compliance

How much exposure does non-compliance introduce towards laws, regulations and supervisory bodies?
Privacy violation

How much personally identifiable information could be disclosed?
Hint:
-

Created by: Code403
Inspired by: The OWASP Risk Assessment Framework and Javier Olmedo's calculator.

